
From nobody Thu Oct  3 07:01:05 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F23C12090D for <hipsec@ietfa.amsl.com>; Thu,  3 Oct 2019 07:01:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dcjQucBfIZnM for <hipsec@ietfa.amsl.com>; Thu,  3 Oct 2019 07:00:59 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B6A8120912 for <hipsec@ietf.org>; Thu,  3 Oct 2019 07:00:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 4B05C62124 for <hipsec@ietf.org>; Thu,  3 Oct 2019 10:00:58 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id uFHajYLR06Zw for <hipsec@ietf.org>; Thu,  3 Oct 2019 10:00:53 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 9297F62116 for <hipsec@ietf.org>; Thu,  3 Oct 2019 10:00:50 -0400 (EDT)
From: Robert Moskowitz <rgm@htt-consult.com>
To: HIP <hipsec@ietf.org>
References: <b080f015-11fc-07a2-3bab-87b189e0c993@htt-consult.com>
Message-ID: <4ff08a0e-4127-f8f6-3b5b-0224d0502c04@htt-consult.com>
Date: Thu, 3 Oct 2019 10:00:42 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.0
MIME-Version: 1.0
In-Reply-To: <b080f015-11fc-07a2-3bab-87b189e0c993@htt-consult.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/kHN1xIcJPNGqnTbiFtmuVd2tPRQ>
Subject: Re: [Hipsec] HIP - TM-RID meeting in Singapore
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Oct 2019 14:01:03 -0000

OK, lets get some discussion here...

Only 32 people signed up for tm-rid list.  Of course if things work out, 
the discussion moves here; hopefully that will be a good thing.

I have requested a tm-rid BOF; I would appreciate it if I were to get 
some interest in others here and commitments to attend the BOF. Here is 
a rough agenda:

5 min Agenda bashing (ya got to bash at the agenda.  Its a tradition).
10 min UAS background (RemoteID, NetworkID, and Command & Control)
10 min UAS/HIP use case
10 min Hierarchical HITs and HIT Registries
5 min New Crypto in HIP (and new ESP Transform: Diet-ESP and Keyak cipher)
10 min RemoteID HIP Authenticated Messages
5 min Hackathon report (If we can get some people working on those 
messages and C2 protection)
5 min Next steps (updated HIP charter) and Q&A

Is that too packed?  Did I leave anything out?  Should I ask for 90min?

The IESG will be looking for activity here to gauge the interest/activity.

Bob

On 9/20/19 4:45 PM, Robert Moskowitz wrote:
> Dear HIPsters,
>
> I am in discussion with Ganzalo and Eric about a HIP session in 
> Singapore.
>
> The focus is the new work to support "Trustworthy Multipurpose 
> RemoteID" with the target user of UAS.
>
> This week I attended the nuair.org UAS Symposium outside of Syracuse 
> NY and received considerable support for HITs as RemoteIDs (along with 
> the other expected formats).  This effort has funding from CLUE (I was 
> told what that means and what piece of legislation set it up, but...).
>
> I have the 1st versions of the 1st 3 drafts.  More to follow.
>
> I would like to see hackathon efforts at Singapore (unfortunately we 
> cannot fly drones in the hackathon room, perhaps we can get them 
> suspended from the ceiling).  Also including HIPv2 software interop 
> testing.
>
> It is early to actually have an agenda, but the question is:
>
> When during the week.
> How long a session.
>
> Eric was thinking a short session on Friday.
>
> I will be there for the whole week, so Friday morning works for me. 
> Who would also be there.  Who could not.
>
> A short session at the end of the week SHOULD be ok.
>
> What about earlier in the week?  Who would attend?  What are conflicts 
> (SAAG, CFRG)?
>
> Eric needs to move forward on scheduling deadlines are coming up. 
> Please chime in.
>
> Bob
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@ietf.org
> https://www.ietf.org/mailman/listinfo/hipsec


From nobody Thu Oct  3 08:27:02 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B27AA12012A for <hipsec@ietfa.amsl.com>; Thu,  3 Oct 2019 08:26:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NxMVVecs0a-J for <hipsec@ietfa.amsl.com>; Thu,  3 Oct 2019 08:26:57 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B53D120114 for <hipsec@ietf.org>; Thu,  3 Oct 2019 08:26:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 7233D6211F for <hipsec@ietf.org>; Thu,  3 Oct 2019 11:26:52 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 5oXrLVVe+u+Q for <hipsec@ietf.org>; Thu,  3 Oct 2019 11:26:46 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 4581C62116 for <hipsec@ietf.org>; Thu,  3 Oct 2019 11:26:46 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <4beb1e52-4eec-1187-08f7-66bc4d1a04ae@htt-consult.com>
Date: Thu, 3 Oct 2019 11:26:40 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.0
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------004801B44291B025A9C4B312"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/0VCW5V0LbxMBl9EtUwkGbLgsdbM>
Subject: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-02.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Oct 2019 15:27:00 -0000

This is a multi-part message in MIME format.
--------------004801B44291B025A9C4B312
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

This is the last update until we get experience and review from the 
(crypto) community.

I think I have covered all the new crypto features outside of changes to 
ESP (rfc 7402).

Bob


-------- Forwarded Message --------
Subject: 	New Version Notification for 
draft-moskowitz-hip-new-crypto-02.txt
Date: 	Thu, 03 Oct 2019 08:23:18 -0700
From: 	internet-drafts@ietf.org
To: 	Stuart Card <stu.card@axenterprize.com>, Adam Wiethuechter 
<adam.wiethuechter@axenterprize.com>, Robert Moskowitz 
<rgm@labs.htt-consult.com>, Stuart W. Card <stu.card@axenterprize.com>




A new version of I-D, draft-moskowitz-hip-new-crypto-02.txt
has been successfully submitted by Robert Moskowitz and posted to the
IETF repository.

Name: draft-moskowitz-hip-new-crypto
Revision: 02
Title: New Cryptographic Algorithms for HIP
Document date: 2019-10-03
Group: Individual Submission
Pages: 12
URL: 
https://www.ietf.org/internet-drafts/draft-moskowitz-hip-new-crypto-02.txt
Status: https://datatracker.ietf.org/doc/draft-moskowitz-hip-new-crypto/
Htmlized: https://tools.ietf.org/html/draft-moskowitz-hip-new-crypto-02
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-new-crypto
Diff: https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-new-crypto-02

Abstract:
This document provides new cryptographic algorithms to be used with
HIP. The Edwards Elliptic Curve and the Keccak sponge functions are
the main focus. The HIP parameters and processing instructions
impacted by these algorithms are defined.



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


--------------004801B44291B025A9C4B312
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"> This is the last update
      until we get experience and review from the (crypto) community.<br>
      <br>
      I think I have covered all the new crypto features outside of
      changes to ESP (rfc 7402).<br>
      <br>
      Bob<br>
      <div class="moz-forward-container"><br>
        <br>
        -------- Forwarded Message --------
        <table class="moz-email-headers-table" cellspacing="0"
          cellpadding="0" border="0">
          <tbody>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Subject:
              </th>
              <td>New Version Notification for
                draft-moskowitz-hip-new-crypto-02.txt</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Date:
              </th>
              <td>Thu, 03 Oct 2019 08:23:18 -0700</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">From:
              </th>
              <td><a class="moz-txt-link-abbreviated"
                  href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">To: </th>
              <td>Stuart Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a>,
                Adam Wiethuechter <a class="moz-txt-link-rfc2396E"
                  href="mailto:adam.wiethuechter@axenterprize.com">&lt;adam.wiethuechter@axenterprize.com&gt;</a>,
                Robert Moskowitz <a class="moz-txt-link-rfc2396E"
                  href="mailto:rgm@labs.htt-consult.com">&lt;rgm@labs.htt-consult.com&gt;</a>,
                Stuart W. Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a></td>
            </tr>
          </tbody>
        </table>
        <br>
        <br>
        <br>
        A new version of I-D, draft-moskowitz-hip-new-crypto-02.txt<br>
        has been successfully submitted by Robert Moskowitz and posted
        to the<br>
        IETF repository.<br>
        <br>
        Name: draft-moskowitz-hip-new-crypto<br>
        Revision: 02<br>
        Title: New Cryptographic Algorithms for HIP<br>
        Document date: 2019-10-03<br>
        Group: Individual Submission<br>
        Pages: 12<br>
        URL:
        <a class="moz-txt-link-freetext"
href="https://www.ietf.org/internet-drafts/draft-moskowitz-hip-new-crypto-02.txt">https://www.ietf.org/internet-drafts/draft-moskowitz-hip-new-crypto-02.txt</a><br>
        Status: <a class="moz-txt-link-freetext"
          href="https://datatracker.ietf.org/doc/draft-moskowitz-hip-new-crypto/">https://datatracker.ietf.org/doc/draft-moskowitz-hip-new-crypto/</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
          href="https://tools.ietf.org/html/draft-moskowitz-hip-new-crypto-02">https://tools.ietf.org/html/draft-moskowitz-hip-new-crypto-02</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-new-crypto">https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-new-crypto</a><br>
        Diff: <a class="moz-txt-link-freetext"
href="https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-new-crypto-02">https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-new-crypto-02</a><br>
        <br>
        Abstract:<br>
        This document provides new cryptographic algorithms to be used
        with<br>
        HIP. The Edwards Elliptic Curve and the Keccak sponge functions
        are<br>
        the main focus. The HIP parameters and processing instructions<br>
        impacted by these algorithms are defined.<br>
        <br>
        <br>
        <br>
        Please note that it may take a couple of minutes from the time
        of submission<br>
        until the htmlized version and diff are available at
        tools.ietf.org.<br>
        <br>
        The IETF Secretariat<br>
        <br>
      </div>
    </div>
  </body>
</html>

--------------004801B44291B025A9C4B312--


From nobody Fri Oct  4 05:15:20 2019
Return-Path: <miika.komu@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D9DB12086F; Fri,  4 Oct 2019 05:15:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iLYDRvFtPKZt; Fri,  4 Oct 2019 05:15:14 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03on061a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0a::61a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AF3B120819; Fri,  4 Oct 2019 05:15:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RiH6qSzOi1NEBTmf8pXzIpgTkb/wzINGki7sOgJg7xRnpjsTeYb2Rsa8SwqI3HkU4mKwe2HzBC9y7igBK/CHjrF0xNwnf2FfP/RXi6QQqOkl399C1vWbrCN1UBHLqc8bSKf5CuOJqhL08m+PGnQThVB5wuRanyg3Si88zpZMouLiON/hqyXVUw/GHdWpyTb6ege7du9dEOqx7HGftjBC5XK4RMQRpCgkTYGTjxF8w50geUsgiYTsV+YyuCxK8wcngGTmP0rYJ1XzXaE2RopJjU9jNJ41cKYeQXvOQLrwCl4KWjKUZkGdX/ams7GB7vOQtgABN+VAfN0+0xWepdvIjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2fjDGKU6wCNgh4GL9lXORZ29lZkg5bEVL51focoOk4Y=; b=aCw2UdVU5JDPq9PGWyA+9J7oguQbBQ7EYrHJp6A/rLgEpvFVbLTKYZmVjt7PlTy3S8lsIUFcwStbaUfV6gyC01SjhiS3KZtaONF1RWAIR4fiBQ4F5xzzFKo8rHA8W0dsPGXB9gV+A0sEvlg3mc/kOACZXO4SiBBAIXRMpnPeANgee5GxzJyBOX3b2pt5fAJxGgz1wBx0GHu4sJ9I8bcoOUFhJE/H0hy/jym2WcLTwCqCNBOTLXp1acAVT68s07pcb+PwpmlKtYjAyfo0Zdp5tnNjoJhEyuIaAZgakca4ep3y5n6WCPXtc4EC3SyVJzzeH1IoJN9jLKJFq2zgE47DZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2fjDGKU6wCNgh4GL9lXORZ29lZkg5bEVL51focoOk4Y=; b=TXhn4waFivhAAiQJRrhi9I326kK2KU4mnomEp1KPoF5WKy4Dw7kTqjZbwbnwtmg9X0zkAmt93NVQOSTTD6HxWARN3UcO+AkotbjXo8p+BGw9R6dGTwkpFLcs8PNCXLYyg6F8QQ4sbBee9wtBOn/gFrRH+aPQ4ImcSOItgZDH5Ew=
Received: from HE1PR0702MB3786.eurprd07.prod.outlook.com (52.133.7.16) by HE1PR0702MB3803.eurprd07.prod.outlook.com (10.167.126.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2347.11; Fri, 4 Oct 2019 12:15:06 +0000
Received: from HE1PR0702MB3786.eurprd07.prod.outlook.com ([fe80::39ef:7c80:2d89:7109]) by HE1PR0702MB3786.eurprd07.prod.outlook.com ([fe80::39ef:7c80:2d89:7109%7]) with mapi id 15.20.2305.023; Fri, 4 Oct 2019 12:15:06 +0000
From: Miika Komu <miika.komu@ericsson.com>
To: "iesg@ietf.org" <iesg@ietf.org>, "adam@nostrum.com" <adam@nostrum.com>
CC: "draft-ietf-hip-native-nat-traversal@ietf.org" <draft-ietf-hip-native-nat-traversal@ietf.org>, "hip-chairs@ietf.org" <hip-chairs@ietf.org>, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>, "hipsec@ietf.org" <hipsec@ietf.org>
Thread-Topic: Adam Roach's Abstain on draft-ietf-hip-native-nat-traversal-28: (with COMMENT)
Thread-Index: AQHT6CHKxJGk6D4vYUWGYDWUcPde1qdNinKA
Date: Fri, 4 Oct 2019 12:15:06 +0000
Message-ID: <83a2fbd94967cc351f30427c449b0df58f53fad6.camel@ericsson.com>
References: <152593099270.10455.6602365389829924376.idtracker@ietfa.amsl.com>
In-Reply-To: <152593099270.10455.6602365389829924376.idtracker@ietfa.amsl.com>
Accept-Language: fi-FI, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Evolution 3.28.5-0ubuntu0.18.04.1 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=miika.komu@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 821db5d8-32cb-4438-c291-08d748c47e5a
x-ms-traffictypediagnostic: HE1PR0702MB3803:
x-ms-exchange-purlcount: 2
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR0702MB3803982D371C66FF6857E3FAFC9E0@HE1PR0702MB3803.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 018093A9B5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(396003)(136003)(366004)(39860400002)(376002)(199004)(189003)(316002)(66574012)(66066001)(81156014)(81166006)(110136005)(54906003)(6512007)(6306002)(50226002)(3846002)(8936002)(6116002)(4326008)(76116006)(6246003)(256004)(66556008)(71200400001)(64756008)(71190400001)(66446008)(66476007)(66946007)(14444005)(118296001)(8676002)(2906002)(86362001)(478600001)(2501003)(7736002)(305945005)(966005)(25786009)(5660300002)(30864003)(229853002)(14454004)(446003)(26005)(11346002)(6506007)(186003)(476003)(2616005)(102836004)(6486002)(99286004)(36756003)(76176011)(486006)(6436002)(44832011)(99106002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0702MB3803; H:HE1PR0702MB3786.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 1+FLA/WDww/rg3p9+Mb9C6VFA8eS3DRAeYf4Fu0zYH8Uet+2OavO2Bh74rlZh7011a9frLXwRGaI9cYj3UZN5yuzg6lySvF9Dy+Q0r1jK2YY2reRh7lVnxaVFrp2CxMuS0r5nsmA5hVWC7J6ghqlE83N1cCq1DmQcJLpquiAiXVkJKuYZ/0mPrVnP5m0iziS4k9QeSk7qz5+NDZftOKURQB4bNFyJISTIZuhGnIyZdh1Uw0H71jzHhZyZ7yLqDP0mQLAvq48oWZuE0PBSPRdngz+x5ZN1h8GV/xu4lKZ2/wiVj4+owuljQqd8ZEMq2lwTgE8cPKkbe85EE3TEjNa+5e5jHzoGSzQjvPJw9eRIL7NDzvK/1UnPdPlFDJZIQOVejusWz4ZNxDorb5GnGXi4VNBeNrSLL/+O7nRlUWKXUUz2QzYAh+athxUISY7IIhmKG39rw1HcZ/uZqJaQTWxJw==
Content-Type: text/plain; charset="utf-8"
Content-ID: <BD7CF94B59DED340B44127F40944C8BA@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 821db5d8-32cb-4438-c291-08d748c47e5a
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Oct 2019 12:15:06.4692 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: T+ZkMOAqczsoFYAqvDlIM8nn9++auDCgThRyulLsSFfMNKLVju0/UFdZn+jrrf/ZtM2ImRrVBkA8sLnlRYvfVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0702MB3803
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/tJ4evwlPEWOEHsRXLjFVlQS-ykE>
Subject: Re: [Hipsec] Adam Roach's Abstain on draft-ietf-hip-native-nat-traversal-28: (with COMMENT)
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Oct 2019 12:15:18 -0000

SGkgQWRhbSwNCg0Ka2UsIDIwMTgtMDUtMDkga2VsbG8gMjI6NDMgLTA3MDAsIEFkYW0gUm9hY2gg
a2lyam9pdHRpOg0KPiBBZGFtIFJvYWNoIGhhcyBlbnRlcmVkIHRoZSBmb2xsb3dpbmcgYmFsbG90
IHBvc2l0aW9uIGZvcg0KPiBkcmFmdC1pZXRmLWhpcC1uYXRpdmUtbmF0LXRyYXZlcnNhbC0yODog
QWJzdGFpbg0KPiANCj4gV2hlbiByZXNwb25kaW5nLCBwbGVhc2Uga2VlcCB0aGUgc3ViamVjdCBs
aW5lIGludGFjdCBhbmQgcmVwbHkgdG8gYWxsDQo+IGVtYWlsIGFkZHJlc3NlcyBpbmNsdWRlZCBp
biB0aGUgVG8gYW5kIENDIGxpbmVzLiAoRmVlbCBmcmVlIHRvIGN1dA0KPiB0aGlzDQo+IGludHJv
ZHVjdG9yeSBwYXJhZ3JhcGgsIGhvd2V2ZXIuKQ0KPiANCj4gDQo+IFBsZWFzZSByZWZlciB0byAN
Cj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvaWVzZy9zdGF0ZW1lbnQvZGlzY3Vzcy1jcml0ZXJpYS5o
dG1sDQo+IGZvciBtb3JlIGluZm9ybWF0aW9uIGFib3V0IElFU0cgRElTQ1VTUyBhbmQgQ09NTUVO
VCBwb3NpdGlvbnMuDQo+IA0KPiANCj4gVGhlIGRvY3VtZW50LCBhbG9uZyB3aXRoIG90aGVyIGJh
bGxvdCBwb3NpdGlvbnMsIGNhbiBiZSBmb3VuZCBoZXJlOg0KPiBodHRwczovL2RhdGF0cmFja2Vy
LmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLWhpcC1uYXRpdmUtbmF0LXRyYXZlcnNhbC8NCj4gDQo+
IA0KPiANCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiAtLS0NCj4gQ09NTUVOVDoNCj4gLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiAt
LS0NCj4gDQo+IEkgc2hhcmUgQmVuJ3MgY29uY2VybnMgYWJvdXQgdGhlIGRpc2pvaW50ZWRuZXNz
IG9mIHRoaXMgZG9jdW1lbnQncw0KPiBzcGVjaWZpY2F0aW9uLCBhbmQgYW0gbGlrZXdpc2UgYWJz
dGFpbmluZy4gTXkgcmVhc29ucyBmb3IgYWJzdGFpbmluZw0KPiBhcmUNCj4gZGVlcGVyIHRoYW4g
QmVuJ3MsIGhvd2V2ZXIuDQo+IA0KPiBJIHJlY29nbml6ZSB0aGF0IHRoZSBlZmZvcnQgcHV0IGlu
dG8gdGhpcyBkb2N1bWVudCBpcyBzdWJzdGFudGlhbCwNCj4gYW5kIHRoYXQNCj4gdGhlIHJlY29t
bWVuZGF0aW9ucyBJIG1ha2UgYXJlIHVubGlrZWx5IHRvIGJlIHRha2VuIGF0IHRoaXMgcG9pbnQg
aW4NCj4gdGltZSwNCj4gYnV0IEkgYmVsaWV2ZSB0aGF0IHRoZSBISVAgZWNvc3lzdGVtIHdvdWxk
IGJlIGZhciBiZXR0ZXIgc2VydmVkIGJ5IGFuDQo+ICJSRkMNCj4gNTU3MCBiaXMiIGFwcHJvYWNo
IHJhdGhlciB0aGFuIGEgbW9kaWZpZWQgZm9ybSBvZiBJQ0UgcmVjYXN0IHVzaW5nDQo+IEhJUA0K
PiBtZXNzYWdlcy4gQW1vbmcgb3RoZXIgcmVhc29uczogc2V2ZXJhbCBjb21wYW5pZXMgYWxyZWFk
eSBvZmZlcg0KPiBnZW9ncmFwaGljYWxseS1kaXN0cmlidXRlZCBob3N0ZWQgVFVSTiBzb2x1dGlv
bnMsIGxhcmdlbHkgZHVlIHRvIHRoZQ0KPiByZWxhdGl2ZQ0KPiBwb3B1bGFyaXR5IG9mIFdlYlJU
Qy4gSElQIHdpbGwgaGF2ZSB0byByZWFjaCBhIHNpbWlsYXIgbGV2ZWwgb2YNCj4gcG9wdWxhcml0
eQ0KPiBiZWZvcmUgSElQLXNwZWNpZmljIHJlbGF5IG5vZGVzIGFyZSBzaW1pbGFybHkgY29tbWVy
Y2lhbGx5DQo+IGF2YWlsYWJsZS4gIFVzaW5nDQo+IElDRSBhcy1pcyB3b3VsZCBhbGxvdyBISVAg
dG8gdXNlIHRob3NlIHNlcnZpY2VzIHRoYXQgYXJlIGF2YWlsYWJsZQ0KPiB0b2RheS4NCg0Kbm90
aGluZyBwcmV2ZW50cyBmcm9tIHVzaW5nIFRVUk4gcmVsYXlzIHdpdGggdGhlIG5hdGl2ZSBOQVQg
dHJhdmVyc2FsDQptb2RlIGFzIG9ubHkgdGhlIGhvc3QgdXNpbmcgVFVSTiByZWxheSBuZWVkcyB0
byBpbXBsZW1lbnQgVFVSTi4NCg0KPiBBcyBhIGZ1cnRoZXIgY29uY2VybiwgSSB3b3JyeSB0aGF0
IHRoaXMgcGF0dGVybiBtYXkgZW5kIHVwIHJlcGxpY2F0ZWQNCj4gaW4gb3RoZXINCj4gcHJvdG9j
b2xzLiBGb3IgZXhhbXBsZSwgYWx0aG91Z2ggSUNFIHdhcyBpbml0aWFsbHkgZGV2ZWxvcGVkIHdp
dGgNCj4gUlRQL1JUQ1AgaW4NCj4gbWluZCwgaXQgd2FzIG5vdCBpbXBsZW1lbnRlZCBhcyBhIHNl
cmllcyBvZiBleHRlbnNpb25zIHRvIFJUUCBvcg0KPiBSVENQOw0KPiBpbnN0ZWFkLCBpdCBpcyBp
dHMgb3duIHByb3RvY29sLCBpbnRlbmRlZCB0byBiZSByZS11c2VkIGluIG90aGVyDQo+IGNvbnRl
eHRzLiBJDQo+IHdvdWxkIG5vdCBsaWtlIHRvIHNlZSwgZS5nLiwgSUNFLWxpa2UgZXh0ZW5zaW9u
cyB0byB0aGUgUVVJQyBwcm90b2NvbA0KPiB0byBlbmFibGUNCj4gaXRzIHVzZSBpbiBwZWVyLXRv
LXBlZXIgc2l0dWF0aW9uczsgSSB3b3VsZCBjZXJ0YWlubHkgaG9wZSB0aGF0IHN1Y2gNCj4gYW4g
ZWZmb3J0DQo+IHdvdWxkIHVzZSBJQ0UgYXMgY3VycmVudGx5IGRlZmluZWQuDQoNCkkgdGhpbmsg
dGhlIGp1c3RpZmljYXRpb24gaXMgb25seSByZWxhdGVkIHRvIElQc2VjIGtleWluZyBkYWVtb25z
LA0KcGxlYXNlIHNlZSBiZWxvdy4NCg0KPiBHaXZlbiB0aGF0IHRoZSBoZWFkbGluZSByYXRpb25h
bGUgb2ZmZXJlZCBpbiB0aGlzIGRvY3VtZW50IGlzIHRoYXQNCj4gIkltcGxlbWVudGluZyBhIGZ1
bGwgSUNFL1NUVU4vVFVSTiBwcm90b2NvbCBzdGFjayBhcyBzcGVjaWZpZWQgaW4NCj4gTGVnYWN5
DQo+IElDRS1ISVAgcmVzdWx0cyBpbiBhIGNvbnNpZGVyYWJsZSBhbW91bnQgb2YgZWZmb3J0IGFu
ZCBjb2RlIHdoaWNoDQo+IGNvdWxkIGJlDQo+IGF2b2lkZWQgYnkgcmUtdXNpbmcgYW5kIGV4dGVu
ZGluZyBISVAgbWVzc2FnZXMgYW5kIHN0YXRlIG1hY2hpbmVzIGZvcg0KPiB0aGUgc2FtZQ0KPiBw
dXJwb3NlLCIgdGhpcyBkb2N1bWVudCBwdXRzIGZvcnRoIGFuIGltcGxpY2F0aW9uIHRoYXQgYWxs
IHByb3RvY29scw0KPiBjb3VsZA0KPiBiZW5lZml0IGZyb20gc2ltaWxhciBub3QtcXVpdGUtSUNF
LWJ1dC1hbG1vc3QtSUNFIGV4dGVuc2lvbnMuIEkNCj4gYmVsaWV2ZQ0KPiB0aGlzIGltcGxpY2F0
aW9uIGlzIGhhcm1mdWwuIEkgYWxzbyBiZWxpZXZlIHRoaXMgYW5hbHlzaXMgb3Zlcmxvb2tzDQo+
IHRoZQ0KPiBhdmFpbGFiaWxpdHkgb2YgbXVsdGlwbGUgZXhpc3RpbmcsIG9wZW4tc291cmNlLCBh
bHJlYWR5LWRlYnVnZ2VkLCBhbmQNCj4gImNvbXBhdGlibGUgd2l0aCBjb21tZXJjaWFsIHVzZSIg
SUNFIGltcGxlbWVudGF0aW9ucy4NCg0KdGhlIHByb3RvY29sIHRoYXQgd2Ugc3BlY2lmeSBpbiB0
aGUgZG9jdW1lbnQgaW1wbGVtZW50cyBvbmx5IGEgc3Vic2V0DQpvZiBJQ0UgYW5kIHRoZXJlIEkg
YmVsaXZlIGl0IHNob3VsZCBiZSByZWxhdGl2ZWx5IHN0cmFpZ2hmb3J3YXJkIHRvDQppbnRlcm9w
IGl0Lg0KDQpJQ0UgaGFzIG5vdCBiZWVuIGRlc2lnbmVkIHdpdGggSVBzZWMgaW4gbWluZCAoc2Vl
IG15IGNvbW1lbnRzIGJlbG93KSwNCnNvIHNvbWV0aGluZyBlbHNlIGlzIG5lZWRlZC4NCg0KPiBJ
dCBpcyBub3QgY2xlYXIgdGhhdCB0aGUgZm91ciBhZGRpdGlvbmFsIHJlYXNvbnMgb2ZmZXJlZCBp
biBBcHBlbmRpeA0KPiBCIGFyZQ0KPiBzdWZmaWNpZW50IHRvIGp1c3RpZnkgdGhlIGRlc2lnbi4g
VGFrZW4gaW4gdHVybjoNCj4gDQo+ID4gIEZvciBleGFtcGxlLCBJQ0UgaXMgbWVhbnQgZm9yIGFw
cGxpY2F0aW9uLWxheWVyIHByb3RvY29scywgd2hlcmVhcw0KPiA+IEhJUA0KPiA+ICBvcGVyYXRl
cyBhdCBsYXllciAzLjUgYmV0d2VlbiB0cmFuc3BvcnQgYW5kIG5ldHdvcmsgbGF5ZXJzLg0KPiAN
Cj4gVGhpcyBkb2Vzbid0IGhhdmUgcHJhY3RpY2FsIGVmZmVjdDogSUNFIGlzIGRlc2lnbmVkIHRv
IHdvcmsgd2l0aA0KPiBnZW5lcmljIFVEUA0KPiBwYWNrZXQgZmxvd3MsIHN1YmplY3Qgb25seSB0
byB0aGUgYWJpbGl0eSB0byBkZW11bHRpcGxleCBTVFVOIGZyb20NCj4gc3VjaA0KPiBwYWNrZXRz
Lg0KPiANCj4gPiAgVGhpcyBpcyBwYXJ0aWN1bGFybHkgcHJvYmxlbWF0aWMgYmVjYXVzZSB0aGUg
aW1wbGVtZW50YXRpb25zDQo+ID4gZW1wbG95IElQc2VjDQo+ID4gIEVTUCBhcyB0aGVpciBkYXRh
IHBsYW5lOiBkZW11bHRpcGxleGluZyBvZiBpbmNvbWluZyBFU1AsIEhJUCBhbmQNCj4gPiBUVVJO
DQo+ID4gIG1lc3NhZ2VzIHJlcXVpcmVkIGNhcHR1cmluZyBvZiBhbGwgVURQIHBhY2tldHMgZGVz
dGluZWQgdG8gcG9ydA0KPiA+IDEwNTAwIHRvDQo+ID4gIHRoZSB1c2Vyc3BhY2UsIHRodXMgY2F1
c2luZyBhZGRpdGlvbmFsIHNvZnR3YXJlIGNvbXBsZXhpdHkgYW5kIGFuDQo+ID4gIHVubmVjZXNz
YXJ5IGxhdGVuY3kvdGhyb3VnaHB1dCBib3R0bGVuZWNrIGZvciB0aGUgZGF0YXBsYW5lDQo+ID4g
cGVyZm9ybWFuY2UuDQo+IA0KPiBUaGlzIGRvZXNuJ3Qgc2VlbSBsaWtlIGEgZm9yZWdvbmUgY29u
c2VxdWVuY2UuIElmIHlvdSdyZSB1c2luZyB1c2VyLQ0KPiBzcGFjZSBISVANCj4gaW1wbGVtZW50
YXRpb25zLCB0aGlzIHVzZXItc3BhY2UgZGl2ZXJzaW9uIGlzIGFscmVhZHkgbmVjZXNzYXJ5LiBJ
Zg0KPiB5b3UncmUNCj4gdXNpbmcga2VybmVsLXNwYWNlIEhJUCBpbXBsZW1lbnRhdGlvbnMsIGl0
IHNlZW1zIGEgbW9kZXN0IHN0ZXAgdG8gYWRkDQo+IG1pbmltYWwNCj4gU1RVTiBkZW11bHRpcGxl
eGluZyB0byB0aGUga2VybmVsIGltcGxlbWVudGF0aW9uIHRoYXQgaXMgYWxyZWFkeQ0KPiBwZXJm
b3JtaW5nDQo+IEVTUC9ISVAgZGVtdWx0aXBsZXhpbmcuICBJdCdzIHBvc3NpYmxlIHRoYXQgSSdt
IG1pc3VuZGVyc3RhbmRpbmcgc29tZQ0KPiBzdWJ0bGUNCj4gYXNwZWN0IG9mIHRoZSB3YXkgdGhl
c2UgcHJvdG9jb2xzIGludGVyYWN0IHdpdGggZWFjaCBvdGhlciwgYnV0IGlzbid0DQo+IHRoaXMN
Cj4gZGVzY3JpYmVkIHBlcmZvcm1hbmNlIGltcGFjdCBzaW1wbHkgdGhlIHJlc3VsdCBvZiBzcGVj
aWZpYw0KPiBpbXBsZW1lbnRhdGlvbg0KPiBkZXNpZ24gZGVjaXNpb25zIHJhdGhlciB0aGFuIGlu
aGVyZW50IHRvIHRoZSBkZXNpZ24gb2YgUkZDIDU1NzAncw0KPiBtZWNoYW5pc20/DQoNCnRoZSB1
c2Vyc3BhY2UgZGl2ZXJzaW9uIGlzIGNvbXBsZXRlbHkgdW5uZWNlc3NhcnkgaW4gdGhlIG5hdGl2
ZSBOQVQNCnRyYXZlcnNhbCBkcmFmdC4gSElQIGNvbnRyb2wgcGFja2V0cyBoYXZlIGEgc3BlY2lh
bCBlbmNvZGluZyBmb2xsb3dpbmcNClJGQzc0MDEgY29udmVudGlvbnMgdGhhdCBhbGxvd3MgdGhl
IElQc2VjIGtlcm5lbCBtb2R1bGUgdG8gcGFzcyB0aGUNCm5vbi1FU1AgcGFja2V0cyB0byB1c2Vy
c3BhY2UgKGkuZS4gdG8gSElQIHVzZXJzcGFjZSBkYW1lb24pLiBFU1ANCnBhY2tldHMgZG8gKm5v
dCogbmVlZCBhbnkgZGl2ZXJzaW9uLg0KDQpJbiB0aGUgbGVnYWN5IEhJUCBOQVQgdHJhdmVyc2Fs
IChSRkM1NzcwKSwgd2UgaGF2ZSB0aGlyZCBwcm90b2NvbA0KKFNUVU4pIG9uIHRoZSBzYW1lIHBv
cnQgYW5kIGl0IGRvZXMgbm90IGZvbGxvdyBSRkM3NDAxIGNvbnZlbnRpb25zDQpiZWNhdXNlIGl0
IHdhcyBub3QgZGVzaWduZWQgd2l0aCBJUHNlYyBpbiBtaW5kLiBBcyBhIHJlc3VsdCwgKmFsbCoN
CnBhY2tldHMgbmVlZCB0byBiZSBkaXZlcnRlZCB0byBhbiB1c2VybGFuZCBkYWVtb24gaW4gb3Jk
ZXIgdG8gc2VwYXJhdGUNCnRoZSBTVFVOIHBhY2tldHMgZnJvbSBISVAvRVNQLiBBbGwgcGFja2V0
cyBtZWFucyBhbHNvIHRoZSBkYXRhDQpwbGFuZSxpLmUuLCBFU1AgZGF0YSBwYWNrZXRzLi4uDQoN
Ckkgc3BlbnQgaGFsZiBhIGRheSB0byBmaW5kIGxlZ2FjeSBISVAgSUNFIG1lYXN1cmVtZW50cyBm
cm9tIGFyb3VuZCAyMA0KbWFzdGVyIHRoZXNlcyBhbmQgcHVibGljYXRpb25zLiBVbmZvcnR1bmF0
ZWx5LCBJIGRpZCBub3QgZmluZCBleGFjdA0KbWF0Y2ggYnV0IEkgd291bGQgYXJndWUgdGhhdCB0
aGUgc28gY2FsbGVkIExTSSB0cmFuc2xhdGlvbiBoYXMgYQ0Kc2ltaWxhciBvdmVyaGVhZCBhcyBw
YXJzaW5nIHRoZSBTVFVOIHBhY2tldHMuIEJhc2VkIG9uIHRoZSBwZWVyIHJldml3ZWQNCnB1Ymxp
Y2F0aW9uIGJlbG93LCBkZWFsaW5nIHdpdGggU1RVTiAob3IgTFNJKSB3aXRoIHVzZXJzcGFjZSBk
YWVtb24gYW5kDQppcHRhYmxlcy1xdWV1ZSB0YXJnZXQgaGFzIHJvdWdobHkgNDAgJSBwZXJmb3Jt
YW5jZSBwZW5hbHR5IG9uIGxhdGVuY3kNCmFuZCAxMiAlIHBlbmFsdHkgb24gdGhyb3VnaHB1dCAo
d2l0aCBUQ1AgdHJhZmZpYykuIFNvIHRoZSBpbXBhY3Qgb24NCmxhdGVuY3kgaXMgSU1ITyB1bmFj
Y2VwdGFibGUuDQoNCkxpcmltIE9zbWFuaSwgU2FsbWFuIFRvb3IsIE1paWthIEtvbXUsIE1hdHRp
IEouIEtvcnRlbGFpbmVuLCBUb21hcw0KTGluZMOpbiwgSm9obiBXaGl0ZSwNClJhc2liIEtoYW4s
IFBhdWxhIEVlcm9sYSwgU2FzdSBUYXJrb21hLCAiU2VjdXJlIENsb3VkIENvbm5lY3Rpdml0eSBm
b3INClNjaWVudGlmaWMgQXBwbGljYXRpb25zIiwNCnNwZWNpYWwgaXNzdWUgb24gQ2xvdWQgU2Vy
dmljZXMgTWVldCBCaWcgRGF0YSBvZiB0aGUgSUVFRSBUcmFuc2FjdGlvbnMNCm9uIFNlcnZpY2Vz
IENvbXB1dGluZywgMjAxNQ0KDQo+ID4gIEFsc28sIHJlbGF5aW5nIG9mIEVTUCBwYWNrZXRzIHZp
YSBUVVJOIHJlbGF5cyB3YXMgbm90DQo+ID4gIGNvbnNpZGVyZWQgdGhhdCBzaW1wbGUgYmVjYXVz
ZSBUVVJOIHJlbGF5cyByZXF1aXJlIGFkZGluZyBhbmQNCj4gPiAgcmVtb3ZpbmcgZXh0cmEgVFVS
TiBmcmFtaW5nIGZvciB0aGUgcmVsYXllZCBwYWNrZXRzLg0KPiANCj4gV2hpbGUgaXQncyBiZWVu
IGEgd2hpbGUgc2luY2UgSSd2ZSBsb29rZWQgYXQgbmV0d29yayBrZXJuZWwgY29kZSwgbXkNCj4g
cmVjb2xsZWN0aW9uIGlzIHRoYXQgaW1wbGVtZW50YXRpb24gb2YgdGhlIFBPU0lYICJzZW5kbXNn
KCkiIHN5c3RlbQ0KPiBjYWxsDQo+IGdlbmVyYWxseSBtYWludGFpbnMgc2NhdHRlci9nYXRoZXIg
YnVmZmVycyBhbGwgdGhlIHdheSBkb3duIHRoZSBzdGFjaw0KPiB1bnRpbA0KPiBzdWNoIGJ5dGVz
IGFyZSBjb3BpZWQgZnJvbSBzeXN0ZW0gbWVtb3J5IHRvIHRoZSBuZXR3b3JrIGhhcmR3YXJlLg0K
PiBTdHJpcHBpbmcNCj4gc3VjaCBoZWFkZXJzIG9uIHJlY2VpcHQgY2FuIGJlIGFjY29tcGxpc2hl
ZCB3aXRoIHNpbXBsZSBwb2ludGVyDQo+IGFyaXRobWV0aWMuDQo+IEl0J3Mgbm90IGNsZWFyIHdo
YXQgYXNwZWN0IG9mIHRoZSBzeXN0ZW0gInNpbXBsZSIgaXMgaW50ZW5kZWQgdG8NCj4gcmVmZXIg
dG8sIGJ1dA0KPiBib3RoIGltcGxlbWVudGF0aW9uIGFuZCBwZXJmb3JtYW5jZSBpbXBhY3RzIHNo
b3VsZCBiZSBpbW1lYXN1cmFibHkNCj4gc21hbGwgd2hlbg0KPiBpbXBsZW1lbnRlZCBpbiB0aGlz
IHdheSwgdW5sZXNzIEknbSBtaXNzaW5nIHNvbWV0aGluZy4NCg0KVGhlIGV4dHJhIFRVUk4gZnJh
bWluZyBtZWFucyB0aGF0IHRoZXJlIHdpbGwgYmUgZXh0cmEgY29udGV4dCBzd2l0Y2hpbmcNCmF0
IHRoZSBlbmRwb2ludHMgYmVjYXVzZSBpdCBuZWVkcyB0byBiZSBoYW5kbGVkIGluIHRoZSB1c2Vy
c3BhY2UNCig9YWRkaXRpb25hbCBsYXRlbmN5LCBsb3dlciBiYW5kd2lkdGgsIHNtYWxsZXIgTVRV
KS4NCg0KV2l0aCBhbiBFU1AgcmVsYXkgKGFzIHNwZWNpZmllZCBpbiBuYXRpdmUgTkFUIHRyYXZl
cnNhbCkgeW91IGRvbid0IG5lZWQNCmFueSBmcmFtaW5nIGF0IGFsbCBhbmQgYWxsIHRoZSBFU1Ag
cHJvY2Vzc2luZyBjYW4gYmUgZG9uZSBhcyBpZiBubw0KcmVsYXkgd2FzIHVzZWQuDQoNCj4gPiAg
RmluYWxseSwgdGhlIGRldmVsb3BlcnMgb2YgdGhlIHR3byBMZWdhY3kgSUNFLUhJUCBpbXBsZW1l
bnRhdGlvbnMNCj4gPiBjb25jbHVkZWQNCj4gPiAgdGhhdCAiZWZmb3J0IG5lZWRlZCBmb3IgaW50
ZWdyYXRpbmcgYW4gSUNFIGxpYnJhcnkgaW50byBhIEhJUA0KPiA+ICBpbXBsZW1lbnRhdGlvbiB0
dXJuZWQgb3V0IHRvIGJlIHF1aXRlIGEgYml0IGhpZ2hlciB0aGF0IGluaXRpYWxseQ0KPiA+ICBl
c3RpbWF0ZWQuICBBbHNvLCB0aGUgYW1vdW50IG9mIGV4dHJhIGNvZGUgKHNvbWUgMTAga0xvQykg
bmVlZGVkDQo+ID4gZm9yIGFsbA0KPiA+ICB0aGUgbmV3IHBhcnNlcnMsIHN0YXRlIG1hY2hpbmVz
LCBldGMuLCBpcyBxdWl0ZSBoaWdoIGFuZCBieSByZS0NCj4gPiB1c2luZyB0aGUNCj4gPiAgSElQ
IGNvZGUgb25lIHNob3VsZCBiZSBhYmxlIHRvIGRvIHdpdGggbXVjaCBsZXNzLiAgVGhpcyBzaG91
bGQNCj4gPiByZXN1bHQgaW4NCj4gPiAgc21hbGxlciBiaW5hcnkgc2l6ZSwgbGVzcyBidWdzLCBh
bmQgZWFzaWVyIGRlYnVnZ2luZy4iLg0KPiANCj4gU3VjaCBzaXplIGlzIG5vdCBpbmhlcmVudCBp
biB0aGUgaW1wbGVtZW50YXRpb24gb2YgSUNFOiBmb3IgZXhhbXBsZSwNCj4gdGhlIElDRQ0KPiBz
dGFjayB1c2VkIGJ5IEZpcmVmb3ggaXMgMi4yIGtMb0MgaW4gc2l6ZSAoaWYgeW91IGlnbm9yZSB0
aGUgfjEuMg0KPiBrTG9DIG9mDQo+IGJvaWxlcnBsYXRlIGNvcHlyaWdodCBub3RpY2UpLiBIYXZp
bmcgc2VlbiB0aGUgZGVidWdnaW5nIG9mIGFuIElDRQ0KPiBzdGFjaw0KPiB1cC1jbG9zZS1hbmQt
cGVyc29uYWwsIEknbSBwcmV0dHkgY29tZm9ydGFibGUgc2F5aW5nIHRoYXQgdGhlIGVmZm9ydA0K
PiB0bw0KPiBpbnRlZ3JhdGUgYSB3b3JraW5nIHN0YWNrIGhhcyB0byBiZSBvcmRlcnMgb2YgbWFn
bml0dWRlIGxlc3MgdGhhbg0KPiBpbXBsZW1lbnRpbmcNCj4gZXZlbiB0aGUgc2ltcGxpZmllZCBJ
Q0UgcHJvY2VkdXJlcyBkZWZpbmVkIGluIHRoaXMgZG9jdW1lbnQNCj4gY29ycmVjdGx5LiBUaGVy
ZQ0KPiBhcmUgYSBsb3Qgb2Ygc3VycHJpc2luZyBjb3JuZXIgY2FzZXMgdGhhdCBkb24ndCByZWFs
bHkgdHVybiB1cCB1bnRpbA0KPiB5b3UgZ2V0DQo+IGludG8gcHJvZHVjdGlvbi4NCg0Kc3VyZWx5
LCB0aGUgY29ybmVyIGNhc2VzIGFyZSBkb2N1bWVudGVkIGluIHRoZSBJQ0Ugc3BlY2lmaWNhdGlv
biBmb3INCm5ldyBJQ0UgaW1wbGVtZW50YXRpb25zLg0KDQo+IEZvciB0aGUgZm9yZWdvaW5nIHJl
YXNvbnMsIGl0IGlzIG15IGNvbmNsdXNpb24gdGhhdCBwdWJsaWNhdGlvbiBvZg0KPiB0aGlzDQo+
IGRvY3VtZW50IGlzIGhhcm1mdWwgZm9yIEhJUCBhbmQgaXMgaGFybWZ1bCBhcyBhIHByZWNlZGVu
dCB0aGF0IG90aGVyDQo+IHByb3RvY29scw0KPiBtYXkgbWlzdGFrZW5seSBlbXVsYXRlLiBJIGJl
bGlldmUgdGhhdCBhIHJlc3RydWN0dXJpbmcgb2YgdGhlDQo+IGRvY3VtZW50IHRvIG1vcmUNCj4g
Y2xlYXJseSBleHBsYWluIHdoeSBISVAgY2hvc2UgdGhpcyBwYXRoIHdoaWxlIG90aGVyIHByb3Rv
Y29scyBzaG91bGQNCj4gbm90IHdvdWxkDQo+IGxpbWl0IHNvbWUgb2YgdGhlc2UgY29uY2VybnMu
IEhvd2V2ZXIsIEkgZG8gbm90IGJlbGlldmUgdGhhdCB0aGUNCj4gZnVuZGFtZW50YWwNCj4gZmxh
dyAtLSBhIHBhcnRpYWwgcmVzcGVjaWZpY2F0aW9uIG9mIElDRSBmb3IgdGhlIGNpdGVkIHJlYXNv
bnMNCj4gLS0gIGNhbiBiZQ0KPiBmaXhlZC4gSSBkbyBub3Qgc3VwcG9ydCBwdWJsaWNhdGlvbiBv
ZiBhIGRvY3VtZW50IGRlc2NyaWJpbmcgdGhpcw0KPiBtZWNoYW5pc20sDQo+IGFuZCBlbmNvdXJh
Z2UgdGhlIHdvcmtpbmcgZ3JvdXAgdG8gd2l0aGRyYXcgdGhlIGRvY3VtZW50IGZyb20NCj4gY29u
c2lkZXJhdGlvbg0KPiBmb3IgcHVibGljYXRpb24uDQoNClRoZSB0ZWNobmljYWwgcG9pbnRzIGFy
ZToNCjEuIFVzaW5nIElDRS1hcy1pcyByZWR1Y2VzIHBlcmZvcm1hbmNlIGNvbnNpZGVyYWJseSBm
b3IgSVBzZWMga2V5aW5nDQpwcm90b2NvbHMNCjIuIFRVUk4gaW5mcmEgY2FuIHN0aWxsIGJlIHJl
dXNlZA0KDQo+IFRvIGJlIGNsZWFyOiBkZXNwaXRlIHRoZSBsZW5ndGggYW5kIGRldGFpbCBvZiBt
eSBwcmVjZWRpbmcNCj4gb2JqZWN0aW9ucywgSQ0KPiByZWNvZ25pemUgdGhhdCBJIG1heSBiZSBv
ZmYgaW4gdGhlIHdlZWRzLiBJIGFtIGhhcHB5IHRvIGJlIGNvcnJlY3RlZA0KPiBhYm91dA0KPiBh
bnkgb2YgdGhlIGFzc2VydGlvbnMgSSBtYWtlIGFib3ZlLCB1cCB0byBhbmQgaW5jbHVkaW5nIGNv
cnJlY3Rpb25zDQo+IHRoYXQgbWFrZSBteQ0KPiBjb25jbHVzaW9uIGluY29ycmVjdC4gSSB3aWxs
IGZ1cnRoZXIgbm90ZSB0aGF0IHRoaXMgaXMgbm90IGEgYmxvY2tpbmcNCj4gYmFsbG90DQo+IHBv
c2l0aW9uLCBhbmQgdGhhdCwgcHJvY2VkdXJhbGx5LCB0aGUgZG9jdW1lbnQgY2FuIGJlIHB1Ymxp
c2hlZA0KPiBkZXNwaXRlIG15DQo+IG1pc2dpdmluZ3MuDQoNClRoYW5rcyBhbmQgbG9va2luZyBm
b3J3YXJkIGZvciBmdXJ0aGVyIGNvbW1lbnRzIGZvciB5b3UuIFBsZWFzZSBhY2NlcHQNCm15IHNp
bmNlIGFwb2xvZ2llcyBmb3IgdGhlIGxvbmcgZGVsYXlzIGJlY2F1c2UgSSBhbSB3b3JraW5nIG9u
IG90aGVyDQp0aGluZ3Mgbm93YWRheXMsIGFuZCBISVAgaXMgbW9yZSBvZiBhIGhvYmJ5IDopDQoN
Cj4gPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09PT09PT09DQo+ID09PT09PQ0KPiANCj4gSSBoYXZlIGluY2x1ZGVkIHNvbWUgYWRk
aXRpb25hbCBjb21tZW50cyBiZWxvdy4NCj4gDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLS0tLS0tLS0NCj4g
DQo+IMKnMToNCj4gDQo+ID4gIEFzIG9uZSBzb2x1dGlvbiwgdGhlIEhJUCBleHBlcmltZW50IHJl
cG9ydCBbUkZDNjUzOF0gbWVudGlvbnMgdGhhdA0KPiA+ICBUZXJlZG8gYmFzZWQgTkFUIHRyYXZl
cnNhbCBmb3IgSElQIGFuZCByZWxhdGVkIEVTUCB0cmFmZmljICh3aXRoDQo+ID4gIGRvdWJsZSB0
dW5uZWxpbmcgb3ZlcmhlYWQpLg0KPiANCj4gVGhpcyBpc24ndCBhIHNlbnRlbmNlLiBQZXJoYXBz
IHJlbW92ZSAidGhhdCI/DQo+IA0KPiBBbHNvOiAiVGVyZWRvLWJhc2VkIg0KDQp0aGFua3MsIGZp
eGVkLg0KDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLS0tLS0tLS0NCj4gDQo+IMKnNC42Og0KPiANCj4gPiAg
VGhlIGNvbm5lY3Rpdml0eSBjaGVja3MgZm9sbG93IHRoZSBJQ0UgbWV0aG9kb2xvZ3kgW01NVVNJ
Qy1JQ0VdLA0KPiA+IGJ1dA0KPiA+ICBVRFAgZW5jYXBzdWxhdGVkIEhJUCBjb250cm9sIG1lc3Nh
Z2VzIGFyZSB1c2VkIGluc3RlYWQgb2YgSUNFDQo+ID4gIG1lc3NhZ2VzLiAgT25seSBub3JtYWwg
bm9taW5hdGlvbiBNVVNUIGJlIHVzZWQgZm9yIHRoZQ0KPiA+IGNvbm5lY3Rpdml0eQ0KPiA+ICBj
aGVja3MsIGkuZS4sIGFnZ3Jlc3NpdmUgbm9taW5hdGlvbiBNVVNUIE5PVCBiZSBlbXBsb3llZC4N
Cj4gDQo+IFRoZSBjaXRlZCBkb2N1bWVudCBkb2VzIG5vdCBkZXNjcmliZSBhZ2dyZXNzaXZlIG5v
bWluYXRpb24sIGFuZA0KPiBkZXByZWNhdGVzIGl0cw0KPiB1c2UuIENvbnNpZGVyIHJlbW92aW5n
IHRoZSBtZW50aW9uIG9mIGFnZ3Jlc3NpdmUgbm9taW5hdGlvbiBpbiB0aGlzDQo+IGRvY3VtZW50
Lg0KDQpkb25lLg0KDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLS0tLS0tLS0NCj4gDQo+IMKnNS40Og0KPiAN
Cj4gPiAgICBUaGUgZm9sbG93aW5nIE5BVCB0cmF2ZXJzYWwgbW9kZSBJRHMgYXJlIGRlZmluZWQ6
DQo+ID4gDQo+ID4gICAgICAgIElEIG5hbWUgICAgICAgICAgICBWYWx1ZQ0KPiA+ICAgICAgICBS
RVNFUlZFRCAgICAgICAgICAgICAwDQo+ID4gICAgICAgIFVEUC1FTkNBUFNVTEFUSU9OICAgIDEN
Cj4gPiAgICAgICAgSUNFLVNUVU4tVURQICAgICAgICAgMg0KPiA+ICAgICAgICBJQ0UtSElQLVVE
UCAgICAgICAgICAzDQo+IA0KPiBUaGlzIHNob3VsZCBwcm9iYWJseSBwb2ludCB0byB0aGUgSUFO
QSB0YWJsZSByYXRoZXIgdGhhbiByZXBsaWNhdGluZw0KPiBhIHNuYXBzaG90DQo+IG9mIGl0cyBj
b250ZW50cy4NCg0KSSBiZWxpZXZlIGl0J3MgY29udmVuaWVudCB0byBkZWZpbmUgdGhlIHZhbHVl
cyBoZXJlIGZvciBkZXZlbG9wZXJzLg0KDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gLS0tLS0tLS0NCj4gDQo+
IEFwcGVuZGl4IEI6DQo+IA0KPiA+ICBvICBVbmxpa2UgaW4gSUNFLCB0aGUgYWRkcmVzc2VzIGFy
ZSBub3QgWE9SLWVkIGluIE5hdGl2ZSBJQ0UtSElQDQo+ID4gICAgIHByb3RvY29sIGluIG9yZGVy
IHRvIGF2b2lkIG1pZGRsZWJveCB0YW1wZXJpbmcuDQo+IA0KPiBUaGlzIGJ1bGxldCBzaG91bGQg
ZXhwbGFpbiB3aHkgc3VjaCBvYmZ1c2NhdGlvbiBpcyB1bm5lY2Vzc2FyeS4NCg0KVGhpcyB3YXMg
YWxyZWFkeSBjaGFuZ2VkIGR1cmluZyB0aGUgSUVTRyByZXZpZXdzIGFuZCBub3cgaXQgc3RhdGVz
Og0KDQpVbmxpa2UgaW4gSUNFLCB0aGUgYWRkcmVzc2VzIGFyZSBub3QgWE9SLWVkIGluIE5hdGl2
ZSBJQ0UtSElQIHByb3RvY29sDQpidXQgcmF0aGVyIGVuY3J5cHRlZCB0byBhdm9pZCBtaWRkbGVi
b3ggdGFtcGVyaW5nLg0KDQo=


From nobody Fri Oct  4 08:58:41 2019
Return-Path: <adam@nostrum.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C832120114; Fri,  4 Oct 2019 08:58:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.28
X-Spam-Level: 
X-Spam-Status: No, score=-1.28 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, KHOP_HELO_FCRDNS=0.4, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nostrum.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52N4dVhPL8xZ; Fri,  4 Oct 2019 08:58:37 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76F181208E6; Fri,  4 Oct 2019 08:58:37 -0700 (PDT)
Received: from Svantevit.local (99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id x94FwSmp018948 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 4 Oct 2019 10:58:29 -0500 (CDT) (envelope-from adam@nostrum.com)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nostrum.com; s=default; t=1570204713; bh=SE84QpxLds7YRFPFrJKbr+GJ8er8grOXkwUtwPKolmQ=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=LIppDv27YwRhE5G09RSj6WkHKHkpyZ1S6BNPp5xAYrY8rUo30tAahZvF+9YaCv+aF btIMfdFqpfIOPVTI4LOKJv+HXIahmB0ejXwibZ/xROnitq9Jjsr/wXOKM8oEXt/u6j YxNv8xLhcEgilw4MpTHbSKFdhl2y1asm25lkhwFg=
X-Authentication-Warning: raven.nostrum.com: Host 99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228] claimed to be Svantevit.local
To: Miika Komu <miika.komu=40ericsson.com@dmarc.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Cc: "hipsec@ietf.org" <hipsec@ietf.org>, "hip-chairs@ietf.org" <hip-chairs@ietf.org>, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>, "draft-ietf-hip-native-nat-traversal@ietf.org" <draft-ietf-hip-native-nat-traversal@ietf.org>
References: <152593099270.10455.6602365389829924376.idtracker@ietfa.amsl.com> <83a2fbd94967cc351f30427c449b0df58f53fad6.camel@ericsson.com>
From: Adam Roach <adam@nostrum.com>
Message-ID: <71d658f7-7d73-2bbd-75aa-ed04bec0442a@nostrum.com>
Date: Fri, 4 Oct 2019 10:58:23 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <83a2fbd94967cc351f30427c449b0df58f53fad6.camel@ericsson.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/PyvYixedlWGeSY-LqoBn-uw5lt8>
Subject: Re: [Hipsec] Adam Roach's Abstain on draft-ietf-hip-native-nat-traversal-28: (with COMMENT)
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Oct 2019 15:58:39 -0000

Thanks for the reply! I think we're getting closer to an answer here, 
but I'm still quite lost on one key aspect.


On 10/4/19 7:15 AM, Miika Komu wrote:
> In the legacy HIP NAT traversal (RFC5770), we have third protocol
> (STUN) on the same port and it does not follow RFC7401 conventions
> because it was not designed with IPsec in mind. As a result,*all*
> packets need to be diverted to an userland daemon in order to separate
> the STUN packets from HIP/ESP.


I can't figure out why this diversion is necessary. What prevents 
characterization of packets in kernel space?

/a


From nobody Mon Oct  7 00:13:09 2019
Return-Path: <miika.komu@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA5D312002F; Mon,  7 Oct 2019 00:13:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.003
X-Spam-Level: 
X-Spam-Status: No, score=-2.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XOgkP-KGSfu9; Mon,  7 Oct 2019 00:13:07 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150054.outbound.protection.outlook.com [40.107.15.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9F2912003E; Mon,  7 Oct 2019 00:13:06 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dyJucR1DQdHNE3MBGNnXTeJC9/cB7onReSXceO8slSScfCDfYkUKVKd8BYlMi2oyhG/SsS8hZTLnkye3reqC1rgTVi67fqoSdYitOLhaUwy5Wd8Z3NI4qZoHh3CHjA6OFIxWFI4UiEkkrZeN0eoyKqBG3Mpjw1PQ8lpjLnTdB8iJ/kh4pjbZq2jffdF44q3u1SHuAzqzRYbq8fU7PJrRzzp01oizuW5hccGXW41KYkGFVqAKe6bcs0j5uO/7UemJGcJPuRpZQcvPy1dYP80SfWAxojPpbYUOBYCT94A8Fy+1LYgdZusa/65h1kEOfseDOwm2OicYDBqsc52VlysFAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g0sCvI2eUeFptdNFHHdBN0JqNulRLj9ZAJ/vdXc4Fcc=; b=ccbYEh3VkXWI3arusgOk6JdyDZJHs1u3Swn22WP9vtghpXvtKaGlds+IGXytRyCIGAsOBVVN2rojZctWrqznk4hdGVRUyiHcByKqThFSB71qaA1Cn0aRLzjHB0VtwkmqDTpJV4sOs/S/Qz28tsGeDRMlcXc3eFtu4xba5zvTQE3W6Gt1GXG28sC69h3+nNzfOZnR/Fti1bUIrBv8PxMHx9RhVnvnQEwXLlBs0Jt93FaLmBIeHUs+t+Rg9SsQTK6FyKK5+EjBILXqT6pr4uXxSx4j0l/M9rQPC+IjhMHWOfY+P2Jxbp8cIWj8s2Z5s05EuFV9djx73c45UL2LyqyZww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g0sCvI2eUeFptdNFHHdBN0JqNulRLj9ZAJ/vdXc4Fcc=; b=Kvhih5Zv64J9jpF0/6YIDJ+KgMLrs+x+9+wkYI0//y09xCQN3u9iB/T05NCaWYQIH848OXbzEOm/1zrd7HVKRNQVHtGfGTjPoIAGF/wkKRfEELQUJmA6Fo+RB6Lx3RNsYRhewo/t5phqVZR12gjuEQVyID6ENWPt07Td23fP1Yg=
Received: from HE1PR0702MB3786.eurprd07.prod.outlook.com (52.133.7.16) by HE1PR0702MB3788.eurprd07.prod.outlook.com (52.133.5.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2327.9; Mon, 7 Oct 2019 07:13:04 +0000
Received: from HE1PR0702MB3786.eurprd07.prod.outlook.com ([fe80::6561:7ae8:969:60dd]) by HE1PR0702MB3786.eurprd07.prod.outlook.com ([fe80::6561:7ae8:969:60dd%6]) with mapi id 15.20.2347.013; Mon, 7 Oct 2019 07:13:04 +0000
From: Miika Komu <miika.komu@ericsson.com>
To: "iesg@ietf.org" <iesg@ietf.org>, "adam@nostrum.com" <adam@nostrum.com>
CC: "hip-chairs@ietf.org" <hip-chairs@ietf.org>, "draft-ietf-hip-native-nat-traversal@ietf.org" <draft-ietf-hip-native-nat-traversal@ietf.org>, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>, "hipsec@ietf.org" <hipsec@ietf.org>
Thread-Topic: Adam Roach's Abstain on draft-ietf-hip-native-nat-traversal-28: (with COMMENT)
Thread-Index: AQHT6CHKxJGk6D4vYUWGYDWUcPde1qdNinKAgAA+Y4CABCQ4gA==
Date: Mon, 7 Oct 2019 07:13:04 +0000
Message-ID: <c6b3396dc841058616ecff6b38646445f556ecb1.camel@ericsson.com>
References: <152593099270.10455.6602365389829924376.idtracker@ietfa.amsl.com> <83a2fbd94967cc351f30427c449b0df58f53fad6.camel@ericsson.com> <71d658f7-7d73-2bbd-75aa-ed04bec0442a@nostrum.com>
In-Reply-To: <71d658f7-7d73-2bbd-75aa-ed04bec0442a@nostrum.com>
Accept-Language: fi-FI, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Evolution 3.28.5-0ubuntu0.18.04.1 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=miika.komu@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 51853ccf-907c-4a32-18fe-08d74af5cbe6
x-ms-traffictypediagnostic: HE1PR0702MB3788:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR0702MB3788D431FAAE1B4CE14FFB4FFC9B0@HE1PR0702MB3788.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01834E39B7
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(396003)(376002)(346002)(136003)(366004)(189003)(51914003)(199004)(86362001)(486006)(66066001)(44832011)(476003)(2616005)(11346002)(446003)(7736002)(305945005)(25786009)(2906002)(186003)(26005)(316002)(4326008)(99286004)(6116002)(478600001)(53546011)(6506007)(76176011)(54906003)(110136005)(3846002)(102836004)(71200400001)(71190400001)(36756003)(14444005)(256004)(14454004)(66476007)(66946007)(6512007)(50226002)(6486002)(229853002)(6246003)(6436002)(81156014)(8676002)(81166006)(8936002)(118296001)(76116006)(66556008)(64756008)(66446008)(5660300002)(2501003)(99106002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0702MB3788; H:HE1PR0702MB3786.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: qok5ovQp9HlCB3afgAwHZQQrg6g345k74HVWuJIeMNbipXSKamwoJ9hDDPx1/6ziNC2Q6atJwmI0q9nI8dT5ar1ZmYHqTxR14JvIrAdH7GSd6V7sQe4YhpH8X6YfCdDJys9CFtr8NNQGd6xaXO4QjlbdHn2/9rdrqvYU2nTK2a5nja91RK2q63UO22i4SzufmRny3y4j2Z2TIDmdDX1HjNNOR2SI+zv51oJRGUd15rmdfZhx2thOwNIbneDkLL7NV8Yy/VnKhxZPXyYP0Zm8L7fbdN5VPVVSuDqb1HmdmCzA93z1FWzmx1Q/wxYOXu8TbdAGxa22H8rbhX6bYAZS1pe3ex1rQV1uuUr9Jb7UkUt3vPPHhdRySCc6OA5YYPOgF5orLkO9NJA0mD+rOCEA8JHgyPNl0tYx6R+32zWJoQc=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F137C1033AB1C34FB64A4A574317BEE2@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 51853ccf-907c-4a32-18fe-08d74af5cbe6
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2019 07:13:04.3552 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8/zIQgtrriPRDEzkja3aDf7qqSJAChiLzfWXt3rpHjhx/bEfQPOj/z8X3PcxqUVd6+zY0eIocsgZ6AE9NBTtFQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0702MB3788
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/Lx3SLQVaHI2ZKsMP8xxT27RMEn8>
Subject: Re: [Hipsec] Adam Roach's Abstain on draft-ietf-hip-native-nat-traversal-28: (with COMMENT)
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 07:13:09 -0000
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From nobody Fri Oct 18 02:54:27 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79E79120850 for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 02:54:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LNn-fHxnNJeI for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 02:54:24 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13F7C12008C for <hipsec@ietf.org>; Fri, 18 Oct 2019 02:54:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 6BDE76211B for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:54:23 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id hBHqvk1I62RR for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:54:16 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 697A6620D4 for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:54:16 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <249716ca-cb4e-b613-1335-9b9ecdc1de6b@htt-consult.com>
Date: Fri, 18 Oct 2019 05:54:08 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------4AD161F940A8EF730DACEE72"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/fRqmqzigknerrRein-ZNwTsNIBM>
Subject: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hierarchical-hit-02.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2019 09:54:27 -0000

This is a multi-part message in MIME format.
--------------4AD161F940A8EF730DACEE72
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Added DNS retrevial text and reference to rfc 8005 HIP RR.


-------- Forwarded Message --------
Subject: 	New Version Notification for 
draft-moskowitz-hip-hierarchical-hit-02.txt
Date: 	Thu, 17 Oct 2019 15:58:35 -0700
From: 	internet-drafts@ietf.org
To: 	Stuart Card <stu.card@axenterprize.com>, Adam Wiethuechter 
<adam.wiethuechter@axenterprize.com>, Robert Moskowitz 
<rgm@labs.htt-consult.com>, Stuart W. Card <stu.card@axenterprize.com>




A new version of I-D, draft-moskowitz-hip-hierarchical-hit-02.txt
has been successfully submitted by Robert Moskowitz and posted to the
IETF repository.

Name: draft-moskowitz-hip-hierarchical-hit
Revision: 02
Title: Hierarchical HITs for HIPv2
Document date: 2019-10-17
Group: Individual Submission
Pages: 10
URL: 
https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hierarchical-hit-02.txt
Status: 
https://datatracker.ietf.org/doc/draft-moskowitz-hip-hierarchical-hit/
Htmlized: 
https://tools.ietf.org/html/draft-moskowitz-hip-hierarchical-hit-02
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hierarchical-hit
Diff: 
https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hierarchical-hit-02

Abstract:
This document describes using a hierarchical HIT to facilitate large
deployments of managed devices. Hierarchical HITs differ from HIPv2
flat HITs by only using 64 bits for mapping the Host Identity,
freeing 32 bits to bind in a hierarchy of Registering Entities that
provide services to the consumers of hierarchical HITs.



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


--------------4AD161F940A8EF730DACEE72
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"> Added DNS retrevial
      text and reference to rfc 8005 HIP RR.<br>
      <div class="moz-forward-container"><br>
        <br>
        -------- Forwarded Message --------
        <table class="moz-email-headers-table" cellspacing="0"
          cellpadding="0" border="0">
          <tbody>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Subject:
              </th>
              <td>New Version Notification for
                draft-moskowitz-hip-hierarchical-hit-02.txt</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Date:
              </th>
              <td>Thu, 17 Oct 2019 15:58:35 -0700</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">From:
              </th>
              <td><a class="moz-txt-link-abbreviated"
                  href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">To: </th>
              <td>Stuart Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a>,
                Adam Wiethuechter <a class="moz-txt-link-rfc2396E"
                  href="mailto:adam.wiethuechter@axenterprize.com">&lt;adam.wiethuechter@axenterprize.com&gt;</a>,
                Robert Moskowitz <a class="moz-txt-link-rfc2396E"
                  href="mailto:rgm@labs.htt-consult.com">&lt;rgm@labs.htt-consult.com&gt;</a>,
                Stuart W. Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a></td>
            </tr>
          </tbody>
        </table>
        <br>
        <br>
        <br>
        A new version of I-D,
        draft-moskowitz-hip-hierarchical-hit-02.txt<br>
        has been successfully submitted by Robert Moskowitz and posted
        to the<br>
        IETF repository.<br>
        <br>
        Name: draft-moskowitz-hip-hierarchical-hit<br>
        Revision: 02<br>
        Title: Hierarchical HITs for HIPv2<br>
        Document date: 2019-10-17<br>
        Group: Individual Submission<br>
        Pages: 10<br>
        URL:
        <a class="moz-txt-link-freetext"
href="https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hierarchical-hit-02.txt">https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hierarchical-hit-02.txt</a><br>
        Status: <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/draft-moskowitz-hip-hierarchical-hit/">https://datatracker.ietf.org/doc/draft-moskowitz-hip-hierarchical-hit/</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
href="https://tools.ietf.org/html/draft-moskowitz-hip-hierarchical-hit-02">https://tools.ietf.org/html/draft-moskowitz-hip-hierarchical-hit-02</a><br>
        Htmlized:
        <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hierarchical-hit">https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hierarchical-hit</a><br>
        Diff:
        <a class="moz-txt-link-freetext"
href="https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hierarchical-hit-02">https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hierarchical-hit-02</a><br>
        <br>
        Abstract:<br>
        This document describes using a hierarchical HIT to facilitate
        large<br>
        deployments of managed devices. Hierarchical HITs differ from
        HIPv2<br>
        flat HITs by only using 64 bits for mapping the Host Identity,<br>
        freeing 32 bits to bind in a hierarchy of Registering Entities
        that<br>
        provide services to the consumers of hierarchical HITs.<br>
        <br>
        <br>
        <br>
        Please note that it may take a couple of minutes from the time
        of submission<br>
        until the htmlized version and diff are available at
        tools.ietf.org.<br>
        <br>
        The IETF Secretariat<br>
        <br>
      </div>
    </div>
  </body>
</html>

--------------4AD161F940A8EF730DACEE72--


From nobody Fri Oct 18 02:55:06 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A29F120850 for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 02:55:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yqff1KKBFxVZ for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 02:55:02 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 831E212008C for <hipsec@ietf.org>; Fri, 18 Oct 2019 02:55:02 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id E8D34620D4 for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:55:01 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id ReZ7FnGgia3M for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:54:56 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 373E06211B for <hipsec@ietf.org>; Fri, 18 Oct 2019 05:54:56 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <29e74e78-9a3a-5011-6417-d5320d55a9d1@htt-consult.com>
Date: Fri, 18 Oct 2019 05:54:55 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------0E49CB6CE958C78C49F88E91"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/btg3A7ngKS0tKgJX5bBykb61obI>
Subject: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hhit-registries-01.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2019 09:55:05 -0000

This is a multi-part message in MIME format.
--------------0E49CB6CE958C78C49F88E91
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Added DNS retrieval text and reference to rfc 8005.


-------- Forwarded Message --------
Subject: 	New Version Notification for 
draft-moskowitz-hip-hhit-registries-01.txt
Date: 	Thu, 17 Oct 2019 16:00:27 -0700
From: 	internet-drafts@ietf.org
To: 	Stuart Card <stu.card@axenterprize.com>, Adam Wiethuechter 
<adam.wiethuechter@axenterprize.com>, Robert Moskowitz 
<rgm@labs.htt-consult.com>, Stuart W. Card <stu.card@axenterprize.com>




A new version of I-D, draft-moskowitz-hip-hhit-registries-01.txt
has been successfully submitted by Robert Moskowitz and posted to the
IETF repository.

Name: draft-moskowitz-hip-hhit-registries
Revision: 01
Title: Hierarchical HIT Registries
Document date: 2019-10-17
Group: Individual Submission
Pages: 12
URL: 
https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-01.txt
Status: 
https://datatracker.ietf.org/doc/draft-moskowitz-hip-hhit-registries/
Htmlized: https://tools.ietf.org/html/draft-moskowitz-hip-hhit-registries-01
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hhit-registries
Diff: 
https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hhit-registries-01

Abstract:
This document describes using the registration protocol and
registries to support hierarchical HITs (HHITs). New and existing
HIP parameters are used to communicate Registry Policies and data
about the HHIT device and the Registries. Further Registries are
expected to provide RVS services for registered HHIT devices.



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


--------------0E49CB6CE958C78C49F88E91
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"> Added DNS retrieval
      text and reference to rfc 8005.<br>
      <div class="moz-forward-container"><br>
        <br>
        -------- Forwarded Message --------
        <table class="moz-email-headers-table" cellspacing="0"
          cellpadding="0" border="0">
          <tbody>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Subject:
              </th>
              <td>New Version Notification for
                draft-moskowitz-hip-hhit-registries-01.txt</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Date:
              </th>
              <td>Thu, 17 Oct 2019 16:00:27 -0700</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">From:
              </th>
              <td><a class="moz-txt-link-abbreviated"
                  href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">To: </th>
              <td>Stuart Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a>,
                Adam Wiethuechter <a class="moz-txt-link-rfc2396E"
                  href="mailto:adam.wiethuechter@axenterprize.com">&lt;adam.wiethuechter@axenterprize.com&gt;</a>,
                Robert Moskowitz <a class="moz-txt-link-rfc2396E"
                  href="mailto:rgm@labs.htt-consult.com">&lt;rgm@labs.htt-consult.com&gt;</a>,
                Stuart W. Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a></td>
            </tr>
          </tbody>
        </table>
        <br>
        <br>
        <br>
        A new version of I-D, draft-moskowitz-hip-hhit-registries-01.txt<br>
        has been successfully submitted by Robert Moskowitz and posted
        to the<br>
        IETF repository.<br>
        <br>
        Name: draft-moskowitz-hip-hhit-registries<br>
        Revision: 01<br>
        Title: Hierarchical HIT Registries<br>
        Document date: 2019-10-17<br>
        Group: Individual Submission<br>
        Pages: 12<br>
        URL:
        <a class="moz-txt-link-freetext"
href="https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-01.txt">https://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-01.txt</a><br>
        Status: <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/draft-moskowitz-hip-hhit-registries/">https://datatracker.ietf.org/doc/draft-moskowitz-hip-hhit-registries/</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
href="https://tools.ietf.org/html/draft-moskowitz-hip-hhit-registries-01">https://tools.ietf.org/html/draft-moskowitz-hip-hhit-registries-01</a><br>
        Htmlized:
        <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hhit-registries">https://datatracker.ietf.org/doc/html/draft-moskowitz-hip-hhit-registries</a><br>
        Diff: <a class="moz-txt-link-freetext"
href="https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hhit-registries-01">https://www.ietf.org/rfcdiff?url2=draft-moskowitz-hip-hhit-registries-01</a><br>
        <br>
        Abstract:<br>
        This document describes using the registration protocol and<br>
        registries to support hierarchical HITs (HHITs). New and
        existing<br>
        HIP parameters are used to communicate Registry Policies and
        data<br>
        about the HHIT device and the Registries. Further Registries are<br>
        expected to provide RVS services for registered HHIT devices.<br>
        <br>
        <br>
        <br>
        Please note that it may take a couple of minutes from the time
        of submission<br>
        until the htmlized version and diff are available at
        tools.ietf.org.<br>
        <br>
        The IETF Secretariat<br>
        <br>
      </div>
    </div>
  </body>
</html>

--------------0E49CB6CE958C78C49F88E91--


From nobody Fri Oct 18 12:11:41 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D826D120827 for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 12:11:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z_FBw-sjGTT6 for <hipsec@ietfa.amsl.com>; Fri, 18 Oct 2019 12:11:38 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56A1112020A for <hipsec@ietf.org>; Fri, 18 Oct 2019 12:11:38 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 4ED466211C for <hipsec@ietf.org>; Fri, 18 Oct 2019 15:11:37 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 6HifvH3c20vy for <hipsec@ietf.org>; Fri, 18 Oct 2019 15:11:30 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 683096211B for <hipsec@ietf.org>; Fri, 18 Oct 2019 15:11:28 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <6311fd1b-0e11-0194-980d-fe98005e4e96@htt-consult.com>
Date: Fri, 18 Oct 2019 15:11:22 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------2051132B1D284FA47ECE6CA8"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/H3MZs64tUCUBQlFNxC95-F3bhkI>
Subject: [Hipsec] Fwd: New Version Notification for draft-wiethuechter-tmrid-auth-00.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2019 19:11:41 -0000

This is a multi-part message in MIME format.
--------------2051132B1D284FA47ECE6CA8
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Here is Adam's first ID covering the proposed HIP augmented Auth messages.

Please read and comment.

Bob


-------- Forwarded Message --------
Subject: 	New Version Notification for draft-wiethuechter-tmrid-auth-00.txt
Date: 	Fri, 18 Oct 2019 12:03:28 -0700
From: 	internet-drafts@ietf.org
To: 	Stuart Card <stu.card@axenterprize.com>, Adam Wiethuechter 
<adam.wiethuechter@axenterprize.com>, Robert Moskowitz 
<rgm@labs.htt-consult.com>, Stuart W. Card <stu.card@axenterprize.com>




A new version of I-D, draft-wiethuechter-tmrid-auth-00.txt
has been successfully submitted by Adam Wiethuechter and posted to the
IETF repository.

Name: draft-wiethuechter-tmrid-auth
Revision: 00
Title: TM-RID Authentication Formats
Document date: 2019-10-18
Group: Individual Submission
Pages: 18
URL: 
https://www.ietf.org/internet-drafts/draft-wiethuechter-tmrid-auth-00.txt
Status: https://datatracker.ietf.org/doc/draft-wiethuechter-tmrid-auth/
Htmlized: https://tools.ietf.org/html/draft-wiethuechter-tmrid-auth-00
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-wiethuechter-tmrid-auth


Abstract:
This document describes how to include HIPv2 into the proposed ASTM
Remote ID specification defined in WK65041 by the F38 Committee under
a Broadcast Remote ID (RID) scenario. It defines a few different
message schemes that can be used to assure past messages sent by a UA
and also act as a assurance for UA trustworthiness in the absence of
Internet connectivity at the receiving node.



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


--------------2051132B1D284FA47ECE6CA8
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"> Here is Adam's first ID
      covering the proposed HIP augmented Auth messages.<br>
      <br>
      Please read and comment.<br>
      <br>
      Bob<br>
      <div class="moz-forward-container"><br>
        <br>
        -------- Forwarded Message --------
        <table class="moz-email-headers-table" cellspacing="0"
          cellpadding="0" border="0">
          <tbody>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Subject:
              </th>
              <td>New Version Notification for
                draft-wiethuechter-tmrid-auth-00.txt</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Date:
              </th>
              <td>Fri, 18 Oct 2019 12:03:28 -0700</td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">From:
              </th>
              <td><a class="moz-txt-link-abbreviated"
                  href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
            </tr>
            <tr>
              <th valign="BASELINE" nowrap="nowrap" align="RIGHT">To: </th>
              <td>Stuart Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a>,
                Adam Wiethuechter <a class="moz-txt-link-rfc2396E"
                  href="mailto:adam.wiethuechter@axenterprize.com">&lt;adam.wiethuechter@axenterprize.com&gt;</a>,
                Robert Moskowitz <a class="moz-txt-link-rfc2396E"
                  href="mailto:rgm@labs.htt-consult.com">&lt;rgm@labs.htt-consult.com&gt;</a>,
                Stuart W. Card <a class="moz-txt-link-rfc2396E"
                  href="mailto:stu.card@axenterprize.com">&lt;stu.card@axenterprize.com&gt;</a></td>
            </tr>
          </tbody>
        </table>
        <br>
        <br>
        <br>
        A new version of I-D, draft-wiethuechter-tmrid-auth-00.txt<br>
        has been successfully submitted by Adam Wiethuechter and posted
        to the<br>
        IETF repository.<br>
        <br>
        Name: draft-wiethuechter-tmrid-auth<br>
        Revision: 00<br>
        Title: TM-RID Authentication Formats<br>
        Document date: 2019-10-18<br>
        Group: Individual Submission<br>
        Pages: 18<br>
        URL:
        <a class="moz-txt-link-freetext"
href="https://www.ietf.org/internet-drafts/draft-wiethuechter-tmrid-auth-00.txt">https://www.ietf.org/internet-drafts/draft-wiethuechter-tmrid-auth-00.txt</a><br>
        Status: <a class="moz-txt-link-freetext"
          href="https://datatracker.ietf.org/doc/draft-wiethuechter-tmrid-auth/">https://datatracker.ietf.org/doc/draft-wiethuechter-tmrid-auth/</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
          href="https://tools.ietf.org/html/draft-wiethuechter-tmrid-auth-00">https://tools.ietf.org/html/draft-wiethuechter-tmrid-auth-00</a><br>
        Htmlized: <a class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/html/draft-wiethuechter-tmrid-auth">https://datatracker.ietf.org/doc/html/draft-wiethuechter-tmrid-auth</a><br>
        <br>
        <br>
        Abstract:<br>
        This document describes how to include HIPv2 into the proposed
        ASTM<br>
        Remote ID specification defined in WK65041 by the F38 Committee
        under<br>
        a Broadcast Remote ID (RID) scenario. It defines a few different<br>
        message schemes that can be used to assure past messages sent by
        a UA<br>
        and also act as a assurance for UA trustworthiness in the
        absence of<br>
        Internet connectivity at the receiving node.<br>
        <br>
        <br>
        <br>
        Please note that it may take a couple of minutes from the time
        of submission<br>
        until the htmlized version and diff are available at
        tools.ietf.org.<br>
        <br>
        The IETF Secretariat<br>
        <br>
      </div>
    </div>
  </body>
</html>

--------------2051132B1D284FA47ECE6CA8--


From nobody Mon Oct 21 01:04:05 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: hipsec@ietf.org
Delivered-To: hipsec@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 40657120132; Mon, 21 Oct 2019 01:04:04 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: hipsec@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.106.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: hipsec@ietf.org
Message-ID: <157164504418.31899.17574763715348927066@ietfa.amsl.com>
Date: Mon, 21 Oct 2019 01:04:04 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/ek7TFAcdKrR01dLugVkfz42yaGs>
Subject: [Hipsec] I-D Action: draft-ietf-hip-dex-10.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2019 08:04:04 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Host Identity Protocol WG of the IETF.

        Title           : HIP Diet EXchange (DEX)
        Authors         : Robert Moskowitz
                          Rene Hummen
                          Miika Komu
	Filename        : draft-ietf-hip-dex-10.txt
	Pages           : 52
	Date            : 2019-10-21

Abstract:
   This document specifies the Host Identity Protocol Diet EXchange (HIP
   DEX), a variant of the Host Identity Protocol Version 2 (HIPv2).  The
   HIP DEX protocol design aims at reducing the overhead of the employed
   cryptographic primitives by omitting public-key signatures and hash
   functions.

   The HIP DEX protocol is primarily designed for computation or memory-
   constrained sensor/actuator devices.  Like HIPv2, it is expected to
   be used together with a suitable security protocol such as the
   Encapsulated Security Payload (ESP) for the protection of upper layer
   protocol data.  In addition, HIP DEX can also be used as a keying
   mechanism for security primitives at the MAC layer, e.g., for IEEE
   802.15.4 networks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-hip-dex/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-hip-dex-10
https://datatracker.ietf.org/doc/html/draft-ietf-hip-dex-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-hip-dex-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Oct 22 19:23:30 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8CC0120048 for <hipsec@ietfa.amsl.com>; Tue, 22 Oct 2019 19:23:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FznBvSL8eEbM for <hipsec@ietfa.amsl.com>; Tue, 22 Oct 2019 19:23:28 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82B4D12022C for <hipsec@ietf.org>; Tue, 22 Oct 2019 19:23:28 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id DB17160D1C for <hipsec@ietf.org>; Tue, 22 Oct 2019 22:23:27 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id xWbjAfJ25Zul for <hipsec@ietf.org>; Tue, 22 Oct 2019 22:23:22 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 2AE5460D1B for <hipsec@ietf.org>; Tue, 22 Oct 2019 22:23:22 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <78039135-f79a-17cc-3b74-4caecd6c27e3@htt-consult.com>
Date: Tue, 22 Oct 2019 22:23:16 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/wjtdlNc3LvQLLyIr_ReeQnKJ1NI>
Subject: [Hipsec] TM-RID BOF Schedule
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2019 02:23:30 -0000

The BOF is Tuesday:

1330-1500  Afternoon Session I
VIP A               INT     tmrid           Trustworthy Multipurpose 
Remote ID BOF
Hullet              IRTF    gaia            Global Access to the 
Internet for All
Padang              IRTF    maprg           Measurement and Analysis for 
Protocols
Collyer             RTG     lsvr            Link State Vector Routing WG
Sophia              RTG     teas            Traffic Engineering 
Architecture and Signaling WG
Canning             SEC     lake            Lightweight Authenticated 
Key Exchange WG
Olivia              SEC     suit            Software Updates for 
Internet of Things WG


I will find out if there is remote access for VIP A.

Bob


From nobody Thu Oct 24 00:31:24 2019
Return-Path: <evyncke@cisco.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38026120860; Thu, 24 Oct 2019 00:31:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=LYOzeXLd; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Mt1Q0p2v
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 376CbrRDeFNy; Thu, 24 Oct 2019 00:31:20 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3566D12001E; Thu, 24 Oct 2019 00:31:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6019; q=dns/txt; s=iport; t=1571902280; x=1573111880; h=from:to:cc:subject:date:message-id:mime-version; bh=BeygxrPEhSp7H3DJR7gkyznkm2gz8RsOjoxD9JcsHCA=; b=LYOzeXLdlFi6BD2NeubUtUBz7YtTXWmwPnLZTUxkag/rSgbX2IQzRzle TQP+t4GLLY+cnHMooa7pyfd8swV+hZmDrAAMSFw0At3gDMfdsHWRg/X/4 9KEKGv9pHy7DAt0mJThkZTiUhZ77l4O4zLTpyw+eIG+9hiI9UpgBaB8Lt I=;
IronPort-PHdr: =?us-ascii?q?9a23=3A+0AqwxXX/tPJ7b3SREdH15Np9mPV8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA92J8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtank3AtVEX1xo13q6KkNSXs35Yg6arw=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DTCQCNUrFd/40NJK1lHAEBAQEBBwE?= =?us-ascii?q?BEQEEBAEBgXuBHC9QBWxXIAQLKoQog0cDil2COZNHhGGCUgNUCQEBAQwBAS0?= =?us-ascii?q?CAQGEQBmDHiQ4EwIDCQEBBAEBAQIBBQRthTcBC4VTFhEdAQE3AREBSgIEMCc?= =?us-ascii?q?EDieDAAGBeU0DLgGnLQKBOIhhdYEygn4BAQWCSYJFGIIXCYE2jA8YgUA/gTg?= =?us-ascii?q?ME4QOhlEygiyPeIU7mDQKgiQDjCWJAhuCO5cXjjmBQJgMAgQCBAUCDgEBBYF?= =?us-ascii?q?pIoFYcBVlAYJBUBAUgwYMDAuDUIpTdIEpjwUBAQ?=
X-IronPort-AV: E=Sophos;i="5.68,223,1569283200";  d="scan'208,217";a="650635159"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 24 Oct 2019 07:31:18 +0000
Received: from XCH-RCD-020.cisco.com (xch-rcd-020.cisco.com [173.37.102.30]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id x9O7VIYs019536 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 24 Oct 2019 07:31:18 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-020.cisco.com (173.37.102.30) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 24 Oct 2019 02:31:18 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 24 Oct 2019 02:31:17 -0500
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 24 Oct 2019 02:31:17 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H+F3QPuY6M0aJt46h+kbBCRaP0gq3TMjMzJffUwmz+rMGOBAo4iXvzHX/q5Wz8chJExxjc0rYCZNjBl8Q8MEPquW2nQJLt3MADNrRI4Z+mD7QN1cDtyN4hSncr5mNFsRT7q06+ZPZKEyyDFxlncdLghYaLN+yaeNTP/Epd8Y1fXsQAhfPQIISZzQJ/6n3X88Ba0kvS0pNhlVTq+HLKgj8mFs3MZJgA8twLfYPwPJYcc8Gu6w6EBs4Str9SdSRPFbQLfrDzsDGEv6r/V0ZNurmsNDoXDl/6fJczJPixB2Kb4CyUdz3/WgC+q77i9LVLwiB+d/a+dhNZTEd1Ao0BhWIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BeygxrPEhSp7H3DJR7gkyznkm2gz8RsOjoxD9JcsHCA=; b=blFd8JsRQS/gJXLIWBsUL7xmsU+Sf/bfcNDqkXWrjkog/nxJgUAYj8+zxADjCOJB2bGg2rbt4qYqiPO42WbaZXopTPfUQBZ9fJ7R0zZAbS7IZK5+ZkBHJ52hYa+D/pMIsVOQv71tEHKPeiBjMuMgLbtPR0vYDls5/a2EsNGTL8LG9ohCO/Un0i8qHhREfYIk6QXiOmxemJjIWUPa7pICiYYERPYszd1Jv7lsCkCBFfZoZ8aniFhghpgGzg5jIjhk4EyQ981+vS3yDm6voVAqamCt1OP2UHa4zsrevBed/s370DXy9vKOZi/BCHHCmEB0P4pTz+oM04dLKXHV8Al+6Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BeygxrPEhSp7H3DJR7gkyznkm2gz8RsOjoxD9JcsHCA=; b=Mt1Q0p2v4DoLtTxnYb8vtRGqpcvjjt4vfd2MFLlaNAO3MRYeh/gR9CsVBBn5jhlOggUa6vlNMIYkFRvOQRJIIsfSNx4AHmsAIAiZrVhKpVuoFUE1TSJZfupFLu9N5zle74hJof3a8mAHl4m65ROjF7BuAgxGd423wJPzlrJ5sqc=
Received: from DM5PR11MB1753.namprd11.prod.outlook.com (10.175.88.141) by DM5PR11MB1561.namprd11.prod.outlook.com (10.172.37.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2387.22; Thu, 24 Oct 2019 07:31:15 +0000
Received: from DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::c1f1:d33a:2203:5a39]) by DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::c1f1:d33a:2203:5a39%7]) with mapi id 15.20.2367.027; Thu, 24 Oct 2019 07:31:14 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "tm-rid@ietf.org" <tm-rid@ietf.org>
CC: "hipsec@ietf.org" <hipsec@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: Finalizing the TM-RID BoF at IETF-106/Singapore
Thread-Index: AQHViB8V32II2ziG2E+bZiEh98FkeA==
Date: Thu, 24 Oct 2019 07:31:13 +0000
Message-ID: <53408B4E-608B-4354-89FB-11260FFA141F@cisco.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.1e.0.191013
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evyncke@cisco.com; 
x-originating-ip: [2001:420:44f0:1252:80ec:66e9:f3f6:e0e5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4424acb9-68fa-444b-f297-08d758542675
x-ms-traffictypediagnostic: DM5PR11MB1561:
x-microsoft-antispam-prvs: <DM5PR11MB1561AA9D60B76426B18DA3BBA96A0@DM5PR11MB1561.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0200DDA8BE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(346002)(136003)(396003)(366004)(39860400002)(189003)(199004)(54906003)(476003)(2501003)(2906002)(99286004)(86362001)(14454004)(6512007)(54896002)(6916009)(5640700003)(36756003)(6306002)(33656002)(91956017)(6116002)(76116006)(6436002)(66946007)(6486002)(66446008)(64756008)(66556008)(66476007)(7736002)(25786009)(58126008)(2351001)(4744005)(5660300002)(8936002)(4326008)(316002)(71190400001)(71200400001)(102836004)(256004)(46003)(6506007)(186003)(2616005)(14444005)(486006)(81166006)(81156014)(478600001)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR11MB1561; H:DM5PR11MB1753.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: J5LColVzJrIl/i7Vc2f5HnM5yxupkm9wDjJ+DE5nuQz5lu9/viMJNQdAljb7BfbGOby+MdOwxs+StBInib/1eDj+xxoilGUo80IyEgc0oj4DBJNf0C3IsSAF+8wkoazNKzGsWoBs6uOsnWR5pR/jhWKfV18cvuULnrk4YLTEfUC+dGu27QsJ2Y0EZdKddQLD3utswpfRrPBDhh8ZQRW/rEOjLBmR02/jJJxeamy1aAnrOL1zLKr9AkZE9pGlFT0EznkS85n3xi5kZC2QIsbo2NzRnWHKupVjATSK/MRAc9HwHMCagM385Jz1FWhv6NKsBAv5a+wW19OzG6wWqwsYO6Nk9P8jalO7a0z5Pg/V5XZdVhO+opgZgL8INZp2933ALmG4Vh2iqHzgdUojtNG0FyxebzjOL/5KQLjsizM5n/FISXV1fXVpbVZh7FhLtvCb
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_53408B4E608B435489FB11260FFA141Fciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 4424acb9-68fa-444b-f297-08d758542675
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2019 07:31:13.8407 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: F4z9ZI2vW5kLDR0TBdyp9jrlFlZh0lDTTEtyR5kuONCCMUK+0A8aTIASGB3Wc7Ua4qw4OYFsuenxkiMTDXh2ng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1561
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.30, xch-rcd-020.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/3bU-9PCHRM7HH2sQTdX6JyTsBL4>
Subject: [Hipsec] Finalizing the TM-RID BoF at IETF-106/Singapore
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Oct 2019 07:31:22 -0000

--_000_53408B4E608B435489FB11260FFA141Fciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_53408B4E608B435489FB11260FFA141Fciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B3AC2A1E665D9F4B93EC796A204B63AC@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4
bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo
dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo
dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp
dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l
dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg
bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj
ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2
IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy
IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt
YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1i
b3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp
IixzYW5zLXNlcmlmO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXBy
aW9yaXR5Ojk5Ow0KCWNvbG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9
DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9y
aXR5Ojk5Ow0KCWNvbG9yOiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpw
Lm1zb25vcm1hbDAsIGxpLm1zb25vcm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1u
YW1lOm1zb25vcm1hbDsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6
MGNtOw0KCW1zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBjbTsNCglm
b250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNw
YW4uRW1haWxTdHlsZTE4DQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5
OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOndpbmRvd3RleHQ7fQ0KLk1zb0NocERlZmF1
bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXplOjEwLjBwdDsNCglm
b250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7
c2l6ZTo2MTIuMHB0IDc5Mi4wcHQ7DQoJbWFyZ2luOjcyLjBwdCA3Mi4wcHQgNzIuMHB0IDcyLjBw
dDt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+
DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRG
NzIiPg0KPGRpdiBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIGxhbmc9IkZSIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+Qm9iIGFuZCBTdHUsPG86cD48
L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRlIiIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+QXJlIHdlIGFs
bCBzZXQgZm9yIHRoaXMgQm9GPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwv
c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx
LjBwdCI+Rm9yIGluc3RhbmNlLCBjdXJyZW50bHkgdGhlcmUgaXMgYSBzaW5nbGUgY2hhaXIgR29u
emFsbyBDYW1hcmlsbG8gd2hpbGUgaXQgbWF5IGJlIHVzZWZ1bCB0byBoYXZlIHR3by48bzpwPjwv
bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPlRoZSBhZ2VuZGEgc2hvdWxkIGFs
c28gaGF2ZSBhIHBvaW50IGFib3V0IHByaXZhY3kgKGV2ZW4gaWYsIGFzIHByZXZpb3VzbHkgZGlz
Y3Vzc2VkLCB0aGVyZSBpcyBubyByZWFsIHByaXZhY3kgb24gcHVycG9zZSkgYW5kIHdoeSBJUCBh
bmQgSElQIHJhdGhlciB0aGFuIGFub3RoZXIgdGVjaG5pcXVlLjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48
bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjExLjBwdCI+QmVzaWRlIHRoZSBkaXNjdXNzaW9uIG9uIHRoZSBjaGFy
dGVyIGZvciBhIHBvdGVudGlhbCBXRywgaXQgd291bGQgYmUgc2FmZXIgdG8gcmVzZXJ2ZSAxMCBt
aW51dGVzIGF0IHRoZSBlbmQgdG8gcHJvYmUgdGhlIHBhcnRpY2lwYW50cyBhYm91dCB0aGUgcXVl
c3Rpb25zIG9mIFJGQyA1NDM0IHRoYXQgYXJlIHJlcXVpcmVkIGluIG9yZGVyIHRvIGZvcm0gYSBX
Ry48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPlVuc3VyZSB3aGV0
aGVyIHlvdSBjYW4gc3RpbGwgdXBkYXRlIHRoZSBCb0YgcGFnZSBvbiB5b3VyIG93biwgZWxzZSwg
c2VuZCBtZSB0aGUgY2hhbmdlcyBhbmQgSSB3aWxsIGFwcGx5IHRoZW08bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPlJlZ2FyZHM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+PG86
cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImZvbnQtc2l6ZToxMS4wcHQiPi3DqXJpYzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_53408B4E608B435489FB11260FFA141Fciscocom_--


From nobody Thu Oct 24 06:57:38 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F19D912086A for <hipsec@ietfa.amsl.com>; Thu, 24 Oct 2019 06:57:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OuPXugrX463F for <hipsec@ietfa.amsl.com>; Thu, 24 Oct 2019 06:57:35 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 269D21201E3 for <hipsec@ietf.org>; Thu, 24 Oct 2019 06:57:35 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 3BFD3620D4 for <hipsec@ietf.org>; Thu, 24 Oct 2019 09:57:34 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 3MocmbqU2aze for <hipsec@ietf.org>; Thu, 24 Oct 2019 09:57:25 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 9E3A460D1B for <hipsec@ietf.org>; Thu, 24 Oct 2019 09:57:25 -0400 (EDT)
To: HIP <hipsec@ietf.org>
References: <53408B4E-608B-4354-89FB-11260FFA141F@cisco.com>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <37751412-42c2-a084-6164-1dabf1772837@htt-consult.com>
Date: Thu, 24 Oct 2019 09:57:20 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
In-Reply-To: <53408B4E-608B-4354-89FB-11260FFA141F@cisco.com>
Content-Type: multipart/alternative; boundary="------------4F5EFD216BB0C5AF5E2EECA7"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/NnxedAgsCHf24F0uQqAPadlF6CY>
Subject: Re: [Hipsec] Finalizing the TM-RID BoF at IETF-106/Singapore
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Oct 2019 13:57:37 -0000

This is a multi-part message in MIME format.
--------------4F5EFD216BB0C5AF5E2EECA7
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Eric,

I will update the agenda.  Work in Progress with also reving Dex draft.

Michael Richardson is triple booked on this time slot, so maybe Carsten 
or Henk.  Or Daniel Migault.

I will ask around.

I posted a message here on the basics of why HIP (it starts with the 
HIT).  Stu is working on his UAS draft that will have a section on why 
HIP and will be in his slides.  But I will add this to the charter and 
agenda.

Privacy of PII is clearly called out in the FAA requirements and Stu 
will cover that as well.  But it will be clearer in the charter. 
Actually a couple ballots on the ASTM doc noted that the use of Serial # 
or CAA registration probably violates PII requirements and HITs can well 
protect PII and still provide strong ID.

But I need to update the BOF info.

Bob


On 10/24/19 3:31 AM, Eric Vyncke (evyncke) wrote:
>
> Bob and Stu,
>
> Are we all set for this BoF?
>
> For instance, currently there is a single chair Gonzalo Camarillo 
> while it may be useful to have two.
>
> The agenda should also have a point about privacy (even if, as 
> previously discussed, there is no real privacy on purpose) and why IP 
> and HIP rather than another technique.
>
> Beside the discussion on the charter for a potential WG, it would be 
> safer to reserve 10 minutes at the end to probe the participants about 
> the questions of RFC 5434 that are required in order to form a WG.
>
> Unsure whether you can still update the BoF page on your own, else, 
> send me the changes and I will apply them
>
> Regards
>
> -éric
>
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@ietf.org
> https://www.ietf.org/mailman/listinfo/hipsec


--------------4F5EFD216BB0C5AF5E2EECA7
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    Eric,<br>
    <br>
    I will update the agenda.  Work in Progress with also reving Dex
    draft.<br>
    <br>
    Michael Richardson is triple booked on this time slot, so maybe
    Carsten or Henk.  Or Daniel Migault.<br>
    <br>
    I will ask around.<br>
    <br>
    I posted a message here on the basics of why HIP (it starts with the
    HIT).  Stu is working on his UAS draft that will have a section on
    why HIP and will be in his slides.  But I will add this to the
    charter and agenda.<br>
    <br>
    Privacy of PII is clearly called out in the FAA requirements and Stu
    will cover that as well.  But it will be clearer in the charter. 
    Actually a couple ballots on the ASTM doc noted that the use of
    Serial # or CAA registration probably violates PII requirements and
    HITs can well protect PII and still provide strong ID.<br>
    <br>
    But I need to update the BOF info.<br>
    <br>
    Bob<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 10/24/19 3:31 AM, Eric Vyncke
      (evyncke) wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:53408B4E-608B-4354-89FB-11260FFA141F@cisco.com">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 15 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size:11.0pt" lang="FR">Bob
            and Stu,<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt" lang="FR"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">Are we all
            set for this BoF?<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">For
            instance, currently there is a single chair Gonzalo
            Camarillo while it may be useful to have two.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">The agenda
            should also have a point about privacy (even if, as
            previously discussed, there is no real privacy on purpose)
            and why IP and HIP rather than another technique.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">Beside the
            discussion on the charter for a potential WG, it would be
            safer to reserve 10 minutes at the end to probe the
            participants about the questions of RFC 5434 that are
            required in order to form a WG.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">Unsure
            whether you can still update the BoF page on your own, else,
            send me the changes and I will apply them<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">Regards<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt">-éric<o:p></o:p></span></p>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <pre class="moz-quote-pre" wrap="">_______________________________________________
Hipsec mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Hipsec@ietf.org">Hipsec@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/hipsec">https://www.ietf.org/mailman/listinfo/hipsec</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------4F5EFD216BB0C5AF5E2EECA7--


From nobody Fri Oct 25 09:02:54 2019
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42A2912094B for <hipsec@ietfa.amsl.com>; Fri, 25 Oct 2019 09:02:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ojCfiMOj0q6p for <hipsec@ietfa.amsl.com>; Fri, 25 Oct 2019 09:02:50 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E318120914 for <hipsec@ietf.org>; Fri, 25 Oct 2019 09:02:50 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 90DC862115 for <hipsec@ietf.org>; Fri, 25 Oct 2019 12:02:49 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 6WV5neLFKY+1 for <hipsec@ietf.org>; Fri, 25 Oct 2019 12:02:37 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 4CD8A620EE for <hipsec@ietf.org>; Fri, 25 Oct 2019 12:02:34 -0400 (EDT)
To: HIP <hipsec@ietf.org>
From: Robert Moskowitz <rgm@htt-consult.com>
Message-ID: <2c733ec8-6873-823c-1e88-f144968d13bc@htt-consult.com>
Date: Fri, 25 Oct 2019 12:02:29 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------49C2906F7170DC076BCC511C"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/uwK-ScdLbz5O15ahSVGw_rSpVFY>
Subject: [Hipsec] Updated TMRID BOF Charter
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Oct 2019 16:02:53 -0000

This is a multi-part message in MIME format.
--------------49C2906F7170DC076BCC511C
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

I have updated the TMRID BOF Charter at:

https://trac.tools.ietf.org/bof/trac/wiki/WikiStart

Here it is.  Comments/corrections/additions welcomed:


Governmental agencies worldwide, including the United States Federal 
Aviation Administration (FAA), are embarking on rule making processes to 
define Remote Identification (RID) requirements for Unmanned Aircraft 
Systems (UAS). ASTM International (formerly the American Society for 
Testing and Materials) F38 Committee Work Item WK65041, “Standard 
Specification for UAS Remote ID and Tracking”, addresses such 
anticipated requirements. Broadcast RID defines a set of messages for 
UAS to send one-way over Bluetooth or IEEE 802.11. Network RID defines 
how the same information (and potentially more) can be made available 
via the Internet. The ASTM draft does not address how to ensure or at 
least assess trustworthiness of information communicated via RID.


The Host Identity Protocol (HIP) Host Identity Tag (HIT) is ideally, in 
fact uniquely, suited to work within this RID effort. For each Unmanned 
Aircraft (UA), a HIT can consolidate the 4-tuple of (UA ID, UA physical 
location, UA onboard host ID, UA onboard host logical location [IP 
address list]) to a 3-tuple (HIT, UA physical location, UA onboard host 
logical location) and thereby provide significant benefits. More 
importantly, the Host Identity (HI) behind the HIT can be used to sign 
Broadcast Authentication Messages, thus proving ownership of the RID 
(HIT) and signed messages.


HITs can also provide significantly superior privacy compared to other 
allowed RID types while providing greater assurance to authorized 
observers that they are accessing the proper PII for the UA.


HIP would benefit from the following updates to be used effectively in 
this environment.


- Hierarchical HITs (HHIT) enabling scalable and trustable UA 
registration and information retrieval: HHIT was part of the original 
design of HIP, but was dropped for lack of a clear use case. RID 
messages containing HHITs will enable use of DNS to access information 
about the UAS.


- expanded HIP Registration for HHITs: This registration process will 
provide proof of authenticity and prevent duplicate HHITs from 
occurring. Further, these Registries will provide the UAS DNS 
information and other services (including support of RVS for Network RID 
and related applications).


- new cryptographic algorithms: Extremely compact keys and signatures 
(such as are enabled by EdDSA and Keccak functions) are needed to meet 
the severely constrained UAS environment.


Additionally, tm-rid will offer specifications for HIP-augmented ASTM 
RID messages. Initially this will consist of additional RID 
Authentication Messages that use the HI in public key signing 
operations: to prove UAS ownership of the HHIT; to authenticate other 
claims made via RID, such as position and velocity, as having been made 
by the owner of that HHIT; and to provide observers lacking current 
Internet connectivity with locally verifiable UAS proof-of-registration 
objects.


Further work will emerge as experience is gained in using HIP for UAS 
RID. For example, some UAS Traffic Management (UTM) systems envision 
using OAuth for Ground Control Systems (GCS) and authorized safety 
personnel. HIP as an OAuth method may help in merging HIP into these 
systems.


The goal is to complete these updates to HIP and publish the TMRID RFCs 
by the end of 2020.



--------------49C2906F7170DC076BCC511C
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"> I have updated the
      TMRID BOF Charter at:<br>
      <br>
      <a class="moz-txt-link-freetext"
        href="https://trac.tools.ietf.org/bof/trac/wiki/WikiStart">https://trac.tools.ietf.org/bof/trac/wiki/WikiStart</a><br>
      <br>
      Here it is.  Comments/corrections/additions welcomed:<br>
      <br>
      <br>
      <p style="margin-bottom: 0in; line-height: 100%">Governmental
        agencies worldwide, including the United States Federal Aviation
        Administration (FAA), are embarking on rule making processes to
        define Remote Identification (RID) requirements for Unmanned
        Aircraft Systems (UAS). ASTM International (formerly the
        American Society for Testing and Materials) F38 Committee Work
        Item WK65041, “Standard Specification for UAS Remote ID and
        Tracking”, addresses such anticipated requirements. Broadcast
        RID defines a set of messages for UAS to send one-way over
        Bluetooth or IEEE 802.11. Network RID defines how the same
        information (and potentially more) can be made available via the
        Internet. The ASTM draft does not address how to ensure or at
        least assess trustworthiness of information communicated via
        RID.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%"><a
          name="__DdeLink__338_3467620224"></a> The Host Identity
        Protocol (HIP) Host Identity Tag (HIT) is ideally, in fact
        uniquely, suited to work within this RID effort. For each
        Unmanned Aircraft (UA), a HIT can consolidate the 4-tuple of (UA
        ID, UA physical location, UA onboard host ID, UA onboard host
        logical location [IP address list]) to a 3-tuple (HIT, UA
        physical location, UA onboard host logical location) and thereby
        provide significant benefits. More importantly, the Host
        Identity (HI) behind the HIT can be used to sign Broadcast
        Authentication Messages, thus proving ownership of the RID (HIT)
        and signed messages.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">HITs can also
        provide significantly superior privacy compared to other allowed
        RID types while providing greater assurance to authorized
        observers that they are accessing the proper PII for the UA.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">HIP would benefit
        from the following updates to be used effectively in this
        environment.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">- Hierarchical
        HITs (HHIT) enabling scalable and trustable UA registration and
        information retrieval: HHIT was part of the original design of
        HIP, but was dropped for lack of a clear use case. RID messages
        containing HHITs will enable use of DNS to access information
        about the UAS.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">- expanded HIP
        Registration for HHITs: This registration process will provide
        proof of authenticity and prevent duplicate HHITs from
        occurring. Further, these Registries will provide the UAS DNS
        information and other services (including support of RVS for
        Network RID and related applications).</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">- new
        cryptographic algorithms: Extremely compact keys and signatures
        (such as are enabled by EdDSA and Keccak functions) are needed
        to meet the severely constrained UAS environment.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%"><a name="_GoBack"></a>
        Additionally, tm-rid will offer specifications for HIP-augmented
        ASTM RID messages. Initially this will consist of additional RID
        Authentication Messages that use the HI in public key signing
        operations: to prove UAS ownership of the HHIT; to authenticate
        other claims made via RID, such as position and velocity, as
        having been made by the owner of that HHIT; and to provide
        observers lacking current Internet connectivity with locally
        verifiable UAS proof-of-registration objects. </p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">Further work will
        emerge as experience is gained in using HIP for UAS RID. For
        example, some UAS Traffic Management (UTM) systems envision
        using OAuth for Ground Control Systems (GCS) and authorized
        safety personnel. HIP as an OAuth method may help in merging HIP
        into these systems.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
      <p style="margin-bottom: 0in; line-height: 100%">The goal is to
        complete these updates to HIP and publish the TMRID RFCs by the
        end of 2020.</p>
      <p style="margin-bottom: 0in; line-height: 100%"><br>
      </p>
    </div>
  </body>
</html>

--------------49C2906F7170DC076BCC511C--


From nobody Thu Oct 31 08:49:57 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: hipsec@ietf.org
Delivered-To: hipsec@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 30BA0120274; Thu, 31 Oct 2019 08:49:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: hipsec@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.108.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: hipsec@ietf.org
Message-ID: <157253699504.30520.319233325014349537@ietfa.amsl.com>
Date: Thu, 31 Oct 2019 08:49:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/Esut7V_g_5J3eqPr8L_6tV8bHAo>
Subject: [Hipsec] I-D Action: draft-ietf-hip-dex-11.txt
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2019 15:49:55 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Host Identity Protocol WG of the IETF.

        Title           : HIP Diet EXchange (DEX)
        Authors         : Robert Moskowitz
                          Rene Hummen
                          Miika Komu
	Filename        : draft-ietf-hip-dex-11.txt
	Pages           : 52
	Date            : 2019-10-31

Abstract:
   This document specifies the Host Identity Protocol Diet EXchange (HIP
   DEX), a variant of the Host Identity Protocol Version 2 (HIPv2).  The
   HIP DEX protocol design aims at reducing the overhead of the employed
   cryptographic primitives by omitting public-key signatures and hash
   functions.

   The HIP DEX protocol is primarily designed for computation or memory-
   constrained sensor/actuator devices.  Like HIPv2, it is expected to
   be used together with a suitable security protocol such as the
   Encapsulated Security Payload (ESP) for the protection of upper layer
   protocol data.  In addition, HIP DEX can also be used as a keying
   mechanism for security primitives at the MAC layer, e.g., for IEEE
   802.15.4 networks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-hip-dex/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-hip-dex-11
https://datatracker.ietf.org/doc/html/draft-ietf-hip-dex-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-hip-dex-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Oct 31 09:05:05 2019
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: hipsec@ietf.org
Delivered-To: hipsec@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7267D120954; Thu, 31 Oct 2019 09:04:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.108.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
CC: hipsec@ietf.org, gonzalo.camarillo@ericsson.com, hip-chairs@ietf.org, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>, draft-ietf-hip-dex@ietf.org, evyncke@cisco.com
Content-Transfer-Encoding: 7bit
Reply-To: last-call@ietf.org
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Message-ID: <157253789837.30396.1693327355009713547.idtracker@ietfa.amsl.com>
Date: Thu, 31 Oct 2019 09:04:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/WCs5T_ZGP1BqzvsHV1OoJjN-L6g>
Subject: [Hipsec] Last Call: <draft-ietf-hip-dex-11.txt> (HIP Diet EXchange (DEX)) to Proposed Standard
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2019 16:05:04 -0000

The IESG has received a request from the Host Identity Protocol WG (hip) to
consider the following document: - 'HIP Diet EXchange (DEX)'
  <draft-ietf-hip-dex-11.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2019-11-14. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies the Host Identity Protocol Diet EXchange (HIP
   DEX), a variant of the Host Identity Protocol Version 2 (HIPv2).  The
   HIP DEX protocol design aims at reducing the overhead of the employed
   cryptographic primitives by omitting public-key signatures and hash
   functions.

   The HIP DEX protocol is primarily designed for computation or memory-
   constrained sensor/actuator devices.  Like HIPv2, it is expected to
   be used together with a suitable security protocol such as the
   Encapsulated Security Payload (ESP) for the protection of upper layer
   protocol data.  In addition, HIP DEX can also be used as a keying
   mechanism for security primitives at the MAC layer, e.g., for IEEE
   802.15.4 networks.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-hip-dex/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-hip-dex/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
    rfc6261: Encrypted Signaling Transport Modes for the Host Identity Protocol (Experimental - IETF stream)



