From nobody Fri Oct 2 05:34:55 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B60ED1B2B15 for ; Fri, 2 Oct 2015 05:34:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.511 X-Spam-Level: X-Spam-Status: No, score=-1.511 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B91bHpAIdNeV for ; Fri, 2 Oct 2015 05:34:52 -0700 (PDT) Received: from hercules.uni.lu (hercules.uni.lu [158.64.76.33]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 589521B2B0E for ; Fri, 2 Oct 2015 05:34:52 -0700 (PDT) X-IronPort-AV: E=Sophos; i="5.17,623,1437429600"; d="scan'208,217"; a="78237129" From: Maria Rita PALATTELLA To: "sdn@irtf.org" Thread-Topic: open position on SDN at the University of Luxembourg Thread-Index: AdD9DgasIgPpmbu2Qfq3nSjOEyzgUQ== Date: Fri, 2 Oct 2015 12:34:49 +0000 Message-ID: Accept-Language: en-US, en-GB Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.91.2.208] Content-Type: multipart/alternative; boundary="_000_F085911F642A6847987ADA23E611780D1D122A7Ehoshiunilux_" MIME-Version: 1.0 Archived-At: Subject: [Sdn] open position on SDN at the University of Luxembourg X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 12:34:54 -0000 --_000_F085911F642A6847987ADA23E611780D1D122A7Ehoshiunilux_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Dear SDN folk, Sorry for the spam, but I believe this post may be of interest for some of = you in this ML, looking for a PostDoc position on SDN. We are hiring at SnT, University of Luxembourg. Please check it, and feel free to apply, if your profile fits nicely. http://emea3.mrted.ly/so4o Thank you! Dr. Maria Rita Palattella Research Associate SnT, University of Luxembourg maria-rita.palattella@uni.lu +352 4666445841 --_000_F085911F642A6847987ADA23E611780D1D122A7Ehoshiunilux_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Dear SDN folk,

 

Sorry for the spam, but I believe this post may be o= f interest for some of you in this ML, looking for a PostDoc position on SD= N.

We are hiring at SnT, University of Luxembourg.=

 

Please check it, and feel free to apply, if your pro= file fits nicely.

http://emea3.mrted.ly/so4o

 

Thank you!

 

Dr. Maria Rita Palattella

Research Associate

SnT, University of Luxembourg

 

maria-rita.palattella@uni.lu

+352 4666445841

 

--_000_F085911F642A6847987ADA23E611780D1D122A7Ehoshiunilux_-- From nobody Mon Oct 5 10:31:24 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D33741B2A33 for ; Mon, 5 Oct 2015 10:31:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.69 X-Spam-Level: X-Spam-Status: No, score=-1.69 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AaJ1LQytBw8l for ; Mon, 5 Oct 2015 10:31:19 -0700 (PDT) Received: from roura.ac.upc.es (roura.ac.upc.edu [147.83.33.10]) by ietfa.amsl.com (Postfix) with ESMTP id DC2551B2A37 for ; Mon, 5 Oct 2015 10:31:18 -0700 (PDT) Received: from gw-3.ac.upc.es (gw-3.ac.upc.es [147.83.30.9]) by roura.ac.upc.es (8.13.8/8.13.8) with ESMTP id t95Fe9e8002882 for ; Mon, 5 Oct 2015 17:40:09 +0200 Received: from mail-lb0-f174.google.com (mail-lb0-f174.google.com [209.85.217.174]) by gw-3.ac.upc.es (Postfix) with ESMTPSA id EF6219A9 for ; Mon, 5 Oct 2015 19:31:16 +0200 (CEST) Received: by lbos8 with SMTP id s8so62142487lbo.0 for ; Mon, 05 Oct 2015 10:31:16 -0700 (PDT) X-Received: by 10.112.32.72 with SMTP id g8mr12070570lbi.22.1444066276278; Mon, 05 Oct 2015 10:31:16 -0700 (PDT) MIME-Version: 1.0 Received: by 10.112.59.225 with HTTP; Mon, 5 Oct 2015 10:30:56 -0700 (PDT) From: Alberto Rodriguez-Natal Date: Mon, 5 Oct 2015 19:30:56 +0200 Message-ID: To: "lisp@ietf.org list" , SDN IRTF list Content-Type: multipart/alternative; boundary=001a1135e3fa6e08af05215ee14c Archived-At: Subject: [Sdn] LISP for SDN X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 17:31:22 -0000 --001a1135e3fa6e08af05215ee14c Content-Type: text/plain; charset=UTF-8 Hi all, We recently published the paper "LISP: a southbound SDN protocol?" in IEEE ComMag, people in these lists may find it interesting: http://www.researchgate.net/publication/280222575_LISP_a_southbound_SDN_protocol Thanks! Alberto --001a1135e3fa6e08af05215ee14c Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi all,

We recently published the pap= er "LISP: a southbound SDN protocol?" in IEEE ComMag, people in t= hese lists may find it interesting:



Thanks!
Alberto
--001a1135e3fa6e08af05215ee14c-- From nobody Wed Oct 7 08:44:14 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42FF91AC42E for ; Wed, 7 Oct 2015 08:43:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.521 X-Spam-Level: X-Spam-Status: No, score=-1.521 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_NEUTRAL=0.779] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aUEm_-zm8bsG for ; Wed, 7 Oct 2015 08:43:50 -0700 (PDT) Received: from sideburn.lancs.ac.uk (sideburn.lancs.ac.uk [148.88.17.22]) by ietfa.amsl.com (Postfix) with ESMTP id 6801E1AC43C for ; Wed, 7 Oct 2015 08:43:49 -0700 (PDT) Received: from ex-0-ht0.lancs.ac.uk ([10.42.18.47] helo=EX-0-HT0.lancs.local) by sideburn.lancs.ac.uk with esmtp (Exim 4.72) (envelope-from ) id 1Zjqse-0006Py-M1 for sdn@irtf.org; Wed, 07 Oct 2015 16:43:48 +0100 Received: from EX-0-MB2.lancs.local ([fe80::9d98:936b:54d1:c531]) by EX-0-HT0.lancs.local ([fe80::7d10:114a:53b0:7f2f%12]) with mapi id 14.03.0248.002; Wed, 7 Oct 2015 16:43:48 +0100 From: "King, Daniel" To: "sdn@irtf.org" Thread-Topic: SDNRG at IETF 94 - Call for Presentations Thread-Index: AdEBFvTjpxTXwIu/SEKXbaD0gvwwSA== Date: Wed, 7 Oct 2015 15:43:48 +0000 Message-ID: <65174429B5AF4C45BD0798810EC48E0A324813D9@EX-0-MB2.lancs.local> Accept-Language: en-GB, en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: x-iss-local-domain: 1 Content-Type: multipart/alternative; boundary="_000_65174429B5AF4C45BD0798810EC48E0A324813D9EX0MB2lancsloca_" MIME-Version: 1.0 Archived-At: Subject: [Sdn] SDNRG at IETF 94 - Call for Presentations X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 15:43:53 -0000 --_000_65174429B5AF4C45BD0798810EC48E0A324813D9EX0MB2lancsloca_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgQWxsLA0KDQoNCg0KSUVURiA5NCBpbiBZb2tvaGFtYSwgSmFwYW4uDQoNCi0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQoNCg0KDQpUaGUgU29mdHdhcmUgRGVmaW5lZCBO ZXR3b3JraW5nIFJlc2VhcmNoIEdyb3VwIChTRE5SRykgd2lsbCBob2xkIGl0cyBuZXh0IG1lZXRp bmcgaW4gY29uanVuY3Rpb24gd2l0aCBJRVRGIDk0IG9uIE1vbmRheSwgTm92ZW1iZXIgMiwgMjAx NSAoSlNUKS4NCg0KDQoNClRoZSBTRE5SRyBQcm9ncmFtIENvbW1pdHRlZSBpcyBzZWVraW5nIHBy b3Bvc2FscyBmb3IgcHJlc2VudGF0aW9ucyBmb3IgdGhlIElSVEYgU0ROUkcgYWdlbmRhLiBQcmVz ZW50YXRpb25zIGhpZ2hsaWdodGluZyBjdXJyZW50IHJlc2VhcmNoIGluIFNETiBhbmQgaXRzIGFw cGxpY2F0aW9ucyBhcmUgZW5jb3VyYWdlZC4gQXJlYXMgb2YgaW50ZXJlc3QgaW5jbHVkZSAoYnV0 IGFyZSBub3QgbGltaXRlZCB0byk6DQoNCg0KDQpvIENsYXNzaWZpY2F0aW9uIG9mIFNETiBtb2Rl bHMsIGluY2x1ZGluZyBEZWZpbml0aW9ucywgVGF4b25vbWllcw0KDQpvIFNETiBtb2RlbCBzY2Fs YWJpbGl0eSBhbmQgYXBwbGljYWJpbGl0eQ0KDQpvIFNETiBTZWN1cml0eQ0KDQpvIFNETiBQb2xp Y3kNCg0KbyBNdWx0aS1sYXllciBwcm9ncmFtbWFiaWxpdHkgYW5kIGZlZWRiYWNrIGNvbnRyb2wg c3lzdGVtcw0KDQpvIFN5c3RlbSBDb21wbGV4aXR5DQoNCm8gTmV0d29yayBkZXNjcmlwdGlvbiBs YW5ndWFnZXMsIGFic3RyYWN0aW9ucywgaW50ZXJmYWNlcyBhbmQNCg0KICAgY29tcGlsZXJzIGlu Y2x1ZGluZyBtZXRob2RzIGFuZCBtZWNoYW5pc21zIGZvciAob24tbGluZSkNCg0KICAgdmVyaWZp Y2F0aW9uIG9mIGNvcnJlY3Qgb3BlcmF0aW9uIG9mIG5ldHdvcmsvbm9kZSBmdW5jdGlvbi4NCg0K IG8gTWV0aG9kcyBmb3IgaW5jcmVhc2luZyB0aGUgZGF0YS1hd2FyZW5lc3Mgb2YgdGhlIG5ldHdv cmsNCg0KDQoNClBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRvIGQua2luZ0BsYW5jYXN0ZXIu YWMudWs8bWFpbHRvOmQua2luZ0BsYW5jYXN0ZXIuYWMudWs+Lg0KDQoNCg0KQ0ZQIERlYWRsaW5l ICMxOiBQcmVzZW50YXRpb24gUHJvcG9zYWwgKEFic3RyYWN0cykgRHVlIGJ5IE9jdCAyNS4NCg0K Q0ZQIERlYWRsaW5lICMyOiBQcmVzZW50YXRpb24gU2xpZGVzIER1ZSAxIE5vdi4NCg0KDQoNCkJS LCBEYW4uDQoNCg0K --_000_65174429B5AF4C45BD0798810EC48E0A324813D9EX0MB2lancsloca_ Content-Type: text/html; charset="utf-8" Content-ID: <3B185BE637C58D4D894E205C2DA502A1@exchange.lancs.ac.uk> Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1i b3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp IixzYW5zLXNlcmlmO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXBy aW9yaXR5Ojk5Ow0KCWNvbG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9 DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9y aXR5Ojk5Ow0KCWNvbG9yOiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpw DQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206 LjAwMDFwdDsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5z LXNlcmlmO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5O30N CkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzIu MHB0IDcyLjBwdCA3Mi4wcHQgNzIuMHB0O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3Jk U2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkVOLUdCIiBsaW5r PSIjMDU2M0MxIiB2bGluaz0iIzk1NEY3MiI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0K PHA+SGkgQWxsLCA8L3A+DQo8cD48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwPklFVEYgOTQgaW4g WW9rb2hhbWEsIEphcGFuLiA8L3A+DQo8cD4tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLTwvcD4NCjxwPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHA+VGhlIFNvZnR3YXJlIERl ZmluZWQgTmV0d29ya2luZyBSZXNlYXJjaCBHcm91cCAoU0ROUkcpIHdpbGwgaG9sZCBpdHMgbmV4 dCBtZWV0aW5nIGluIGNvbmp1bmN0aW9uIHdpdGggSUVURiA5NCBvbiBNb25kYXksIE5vdmVtYmVy IDIsIDIwMTUgKEpTVCkuDQo8L3A+DQo8cD48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwPlRoZSBT RE5SRyBQcm9ncmFtIENvbW1pdHRlZSBpcyBzZWVraW5nIHByb3Bvc2FscyBmb3IgcHJlc2VudGF0 aW9ucyBmb3IgdGhlIElSVEYgU0ROUkcgYWdlbmRhLiBQcmVzZW50YXRpb25zIGhpZ2hsaWdodGlu ZyBjdXJyZW50IHJlc2VhcmNoIGluIFNETiBhbmQgaXRzIGFwcGxpY2F0aW9ucyBhcmUgZW5jb3Vy YWdlZC4gQXJlYXMgb2YgaW50ZXJlc3QgaW5jbHVkZSAoYnV0IGFyZSBub3QgbGltaXRlZCB0byk6 PC9wPg0KPHA+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cD5vIENsYXNzaWZpY2F0aW9uIG9mIFNE TiBtb2RlbHMsIGluY2x1ZGluZyBEZWZpbml0aW9ucywgVGF4b25vbWllczwvcD4NCjxwPm8gU0RO IG1vZGVsIHNjYWxhYmlsaXR5IGFuZCBhcHBsaWNhYmlsaXR5PC9wPg0KPHA+byBTRE4gU2VjdXJp dHk8L3A+DQo8cD5vIFNETiBQb2xpY3kgPC9wPg0KPHA+byBNdWx0aS1sYXllciBwcm9ncmFtbWFi aWxpdHkgYW5kIGZlZWRiYWNrIGNvbnRyb2wgc3lzdGVtczwvcD4NCjxwPm8gU3lzdGVtIENvbXBs ZXhpdHk8L3A+DQo8cD5vIE5ldHdvcmsgZGVzY3JpcHRpb24gbGFuZ3VhZ2VzLCBhYnN0cmFjdGlv bnMsIGludGVyZmFjZXMgYW5kPC9wPg0KPHA+Jm5ic3A7Jm5ic3A7IGNvbXBpbGVycyBpbmNsdWRp bmcgbWV0aG9kcyBhbmQgbWVjaGFuaXNtcyBmb3IgKG9uLWxpbmUpPC9wPg0KPHA+Jm5ic3A7Jm5i c3A7IHZlcmlmaWNhdGlvbiBvZiBjb3JyZWN0IG9wZXJhdGlvbiBvZiBuZXR3b3JrL25vZGUgZnVu Y3Rpb24uIDwvcD4NCjxwPiZuYnNwO28gTWV0aG9kcyBmb3IgaW5jcmVhc2luZyB0aGUgZGF0YS1h d2FyZW5lc3Mgb2YgdGhlIG5ldHdvcms8L3A+DQo8cD48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxw PlBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRvIDxhIGhyZWY9Im1haWx0bzpkLmtpbmdAbGFu Y2FzdGVyLmFjLnVrIj5kLmtpbmdAbGFuY2FzdGVyLmFjLnVrPC9hPi4gJm5ic3A7PC9wPg0KPHA+ PG86cD4mbmJzcDs8L286cD48L3A+DQo8cD5DRlAgRGVhZGxpbmUgIzE6IFByZXNlbnRhdGlvbiBQ cm9wb3NhbCAoQWJzdHJhY3RzKSBEdWUgYnkgT2N0IDI1LjwvcD4NCjxwPkNGUCBEZWFkbGluZSAj MjogUHJlc2VudGF0aW9uIFNsaWRlcyBEdWUgMSBOb3YuIDwvcD4NCjxwPjxvOnA+Jm5ic3A7PC9v OnA+PC9wPg0KPHA+QlIsIERhbi48L3A+DQo8cD48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_65174429B5AF4C45BD0798810EC48E0A324813D9EX0MB2lancsloca_-- From nobody Fri Oct 9 00:24:06 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52E8B1A6F3A for ; Fri, 9 Oct 2015 00:24:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M5QXYmLk3QyZ for ; Fri, 9 Oct 2015 00:24:02 -0700 (PDT) Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [119.145.14.66]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85B7E1A6F2E for ; Fri, 9 Oct 2015 00:24:00 -0700 (PDT) Received: from 172.24.1.47 (EHLO nkgeml410-hub.china.huawei.com) ([172.24.1.47]) by szxrg03-dlp.huawei.com (MOS 4.4.3-GA FastPath queued) with ESMTP id BOP41179; Fri, 09 Oct 2015 15:23:47 +0800 (CST) Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.75]) by nkgeml410-hub.china.huawei.com ([10.98.56.41]) with mapi id 14.03.0235.001; Fri, 9 Oct 2015 15:23:40 +0800 From: "Songhaibin (A)" To: "King, Daniel" , "sdn@irtf.org" Thread-Topic: SDNRG at IETF 94 - Call for Presentations Thread-Index: AdEBFvTjpxTXwIu/SEKXbaD0gvwwSABS+peg Date: Fri, 9 Oct 2015 07:23:40 +0000 Message-ID: References: <65174429B5AF4C45BD0798810EC48E0A324813D9@EX-0-MB2.lancs.local> In-Reply-To: <65174429B5AF4C45BD0798810EC48E0A324813D9@EX-0-MB2.lancs.local> Accept-Language: en-US, zh-CN Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.138.41.75] Content-Type: multipart/alternative; boundary="_000_E33E01DFD5BEA24B9F3F18671078951F653A195Ankgeml501mbschi_" MIME-Version: 1.0 X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020206.56176B85.0118, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.2.75, so=2013-05-26 15:14:31, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 4755f5f7fd122beebbc796dfccc42f31 Archived-At: Subject: Re: [Sdn] SDNRG at IETF 94 - Call for Presentations X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 07:24:05 -0000 --_000_E33E01DFD5BEA24B9F3F18671078951F653A195Ankgeml501mbschi_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 RGVhciBEYW4sDQoNCk15IGd1dCBmZWVsaW5nIGZyb20gbGFzdCBTRE5SRyBtZWV0aW5nIHdhcyB0 aGVyZSB3ZXJlIHBsZW50eSBvZiBwcmVzZW50YXRpb25zIGJ1dCBsZWZ0IG5vIHRpbWUgZm9yIGRp c2N1c3Npb24gb2YgZWFjaCBwcmVzZW50YXRpb24uIEkgaG9wZSBmb3IgWW9rb2hhbWEgbWVldGlu ZywgdGhlcmUgd2lsbCBiZSBhIGxpdHRsZSB0aW1lIGZvciBkaXNjdXNzaW9uIOKYug0KDQpCZXN0 IFJlZ2FyZHMhDQotSGFpYmluDQoNCkZyb206IHNkbiBbbWFpbHRvOnNkbi1ib3VuY2VzQG1haWwu aWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBLaW5nLCBEYW5pZWwNClNlbnQ6IFdlZG5lc2RheSwgT2N0 b2JlciAwNywgMjAxNSAxMTo0NCBQTQ0KVG86IHNkbkBpcnRmLm9yZw0KU3ViamVjdDogW1Nkbl0g U0ROUkcgYXQgSUVURiA5NCAtIENhbGwgZm9yIFByZXNlbnRhdGlvbnMNCg0KDQpIaSBBbGwsDQoN Cg0KDQpJRVRGIDk0IGluIFlva29oYW1hLCBKYXBhbi4NCg0KLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0NCg0KDQoNClRoZSBTb2Z0d2FyZSBEZWZpbmVkIE5ldHdvcmtpbmcg UmVzZWFyY2ggR3JvdXAgKFNETlJHKSB3aWxsIGhvbGQgaXRzIG5leHQgbWVldGluZyBpbiBjb25q dW5jdGlvbiB3aXRoIElFVEYgOTQgb24gTW9uZGF5LCBOb3ZlbWJlciAyLCAyMDE1IChKU1QpLg0K DQoNCg0KVGhlIFNETlJHIFByb2dyYW0gQ29tbWl0dGVlIGlzIHNlZWtpbmcgcHJvcG9zYWxzIGZv ciBwcmVzZW50YXRpb25zIGZvciB0aGUgSVJURiBTRE5SRyBhZ2VuZGEuIFByZXNlbnRhdGlvbnMg aGlnaGxpZ2h0aW5nIGN1cnJlbnQgcmVzZWFyY2ggaW4gU0ROIGFuZCBpdHMgYXBwbGljYXRpb25z IGFyZSBlbmNvdXJhZ2VkLiBBcmVhcyBvZiBpbnRlcmVzdCBpbmNsdWRlIChidXQgYXJlIG5vdCBs aW1pdGVkIHRvKToNCg0KDQoNCm8gQ2xhc3NpZmljYXRpb24gb2YgU0ROIG1vZGVscywgaW5jbHVk aW5nIERlZmluaXRpb25zLCBUYXhvbm9taWVzDQoNCm8gU0ROIG1vZGVsIHNjYWxhYmlsaXR5IGFu ZCBhcHBsaWNhYmlsaXR5DQoNCm8gU0ROIFNlY3VyaXR5DQoNCm8gU0ROIFBvbGljeQ0KDQpvIE11 bHRpLWxheWVyIHByb2dyYW1tYWJpbGl0eSBhbmQgZmVlZGJhY2sgY29udHJvbCBzeXN0ZW1zDQoN Cm8gU3lzdGVtIENvbXBsZXhpdHkNCg0KbyBOZXR3b3JrIGRlc2NyaXB0aW9uIGxhbmd1YWdlcywg YWJzdHJhY3Rpb25zLCBpbnRlcmZhY2VzIGFuZA0KDQogICBjb21waWxlcnMgaW5jbHVkaW5nIG1l dGhvZHMgYW5kIG1lY2hhbmlzbXMgZm9yIChvbi1saW5lKQ0KDQogICB2ZXJpZmljYXRpb24gb2Yg Y29ycmVjdCBvcGVyYXRpb24gb2YgbmV0d29yay9ub2RlIGZ1bmN0aW9uLg0KDQogbyBNZXRob2Rz IGZvciBpbmNyZWFzaW5nIHRoZSBkYXRhLWF3YXJlbmVzcyBvZiB0aGUgbmV0d29yaw0KDQoNCg0K UGxlYXNlIHNlbmQgeW91ciBwcm9wb3NhbHMgdG8gZC5raW5nQGxhbmNhc3Rlci5hYy51azxtYWls dG86ZC5raW5nQGxhbmNhc3Rlci5hYy51az4uDQoNCg0KDQpDRlAgRGVhZGxpbmUgIzE6IFByZXNl bnRhdGlvbiBQcm9wb3NhbCAoQWJzdHJhY3RzKSBEdWUgYnkgT2N0IDI1Lg0KDQpDRlAgRGVhZGxp bmUgIzI6IFByZXNlbnRhdGlvbiBTbGlkZXMgRHVlIDEgTm92Lg0KDQoNCg0KQlIsIERhbi4NCg0K DQo= --_000_E33E01DFD5BEA24B9F3F18671078951F653A195Ankgeml501mbschi_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 V2luZ2RpbmdzOw0KCXBhbm9zZS0xOjUgMCAwIDAgMCAwIDAgMCAwIDA7fQ0KQGZvbnQtZmFjZQ0K CXtmb250LWZhbWlseTrlrovkvZM7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpA Zm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgiOw0KCXBhbm9zZS0xOjIgNCA1 IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpDYWxpYnJpOw0KCXBh bm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IlxA5a6L5L2TIjsNCglwYW5vc2UtMToyIDEgNiAwIDMgMSAxIDEgMSAxO30NCkBmb250LWZhY2UN Cgl7Zm9udC1mYW1pbHk6VGFob21hOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDMgNSA0IDQgMiA0O30N Ci8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYu TXNvTm9ybWFsDQoJe21hcmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQt c2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjt9DQphOmxp bmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjoj MDU2M0MxOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1z b0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjojOTU0 RjcyOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcA0KCXttc28tc3R5bGUtcHJpb3Jp dHk6OTk7DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXpl OjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCnNwYW4uRW1h aWxTdHlsZTE4DQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5 OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7DQoJY29sb3I6IzFGNDk3RDt9DQouTXNvQ2hwRGVmYXVs dA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBw YWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzIuMHB0 IDcyLjBwdCA3Mi4wcHQgNzIuMHB0O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3JkU2Vj dGlvbjE7fQ0KLS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlZGVm YXVsdHMgdjpleHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRpZl0tLT48 IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0Ij4NCjxv OmlkbWFwIHY6ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0PjwveG1sPjwh W2VuZGlmXS0tPg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iWkgtQ04iIGxpbms9IiMwNTYzQzEiIHZs aW5rPSIjOTU0RjcyIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6 IzFGNDk3RCI+RGVhciBEYW4sPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2NvbG9yOiMx RjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdE Ij5NeSBndXQgZmVlbGluZyBmcm9tIGxhc3QgU0ROUkcgbWVldGluZyB3YXMgdGhlcmUgd2VyZSBw bGVudHkgb2YgcHJlc2VudGF0aW9ucyBidXQgbGVmdCBubyB0aW1lIGZvciBkaXNjdXNzaW9uIG9m IGVhY2ggcHJlc2VudGF0aW9uLiBJIGhvcGUgZm9yIFlva29oYW1hIG1lZXRpbmcsIHRoZXJlIHdp bGwgYmUgYSBsaXR0bGUNCiB0aW1lIGZvciBkaXNjdXNzaW9uIDwvc3Bhbj48c3BhbiBsYW5nPSJF Ti1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6V2luZ2RpbmdzO2NvbG9y OiMxRjQ5N0QiPko8L3NwYW4+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAu NXB0O2NvbG9yOiMxRjQ5N0QiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjoj MUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCIgc3R5bGU9InRleHQtYWxpZ246anVzdGlmeTt0ZXh0LWp1c3RpZnk6aW50ZXItaWRl b2dyYXBoIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6 IzFGNDk3RCI+QmVzdCBSZWdhcmRzITxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiIHN0eWxlPSJ0ZXh0LWFsaWduOmp1c3RpZnk7dGV4dC1qdXN0aWZ5OmludGVyLWlk ZW9ncmFwaCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2NvbG9y OiMxRjQ5N0QiPi1IYWliaW48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtj b2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJi b3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBibHVlIDEuNXB0O3BhZGRpbmc6MGNtIDBjbSAw Y20gNC4wcHQiPg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29s aWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0IDBjbSAwY20gMGNtIj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtm b250LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+RnJv bTo8L3NwYW4+PC9iPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtm b250LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+IHNk biBbbWFpbHRvOnNkbi1ib3VuY2VzQG1haWwuaWV0Zi5vcmddDQo8Yj5PbiBCZWhhbGYgT2YgPC9i PktpbmcsIERhbmllbDxicj4NCjxiPlNlbnQ6PC9iPiBXZWRuZXNkYXksIE9jdG9iZXIgMDcsIDIw MTUgMTE6NDQgUE08YnI+DQo8Yj5Ubzo8L2I+IHNkbkBpcnRmLm9yZzxicj4NCjxiPlN1YmplY3Q6 PC9iPiBbU2RuXSBTRE5SRyBhdCBJRVRGIDk0IC0gQ2FsbCBmb3IgUHJlc2VudGF0aW9uczxvOnA+ PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4g bGFuZz0iRU4tR0IiPkhpIEFsbCwgPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFu Zz0iRU4tR0IiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVO LUdCIj5JRVRGIDk0IGluIFlva29oYW1hLCBKYXBhbi4gPG86cD48L286cD48L3NwYW4+PC9wPg0K PHA+PHNwYW4gbGFuZz0iRU4tR0IiPi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPjxvOnA+Jm5i c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj5UaGUgU29mdHdhcmUg RGVmaW5lZCBOZXR3b3JraW5nIFJlc2VhcmNoIEdyb3VwIChTRE5SRykgd2lsbCBob2xkIGl0cyBu ZXh0IG1lZXRpbmcgaW4gY29uanVuY3Rpb24gd2l0aCBJRVRGIDk0IG9uIE1vbmRheSwgTm92ZW1i ZXIgMiwgMjAxNSAoSlNUKS4NCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9 IkVOLUdCIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1H QiI+VGhlIFNETlJHIFByb2dyYW0gQ29tbWl0dGVlIGlzIHNlZWtpbmcgcHJvcG9zYWxzIGZvciBw cmVzZW50YXRpb25zIGZvciB0aGUgSVJURiBTRE5SRyBhZ2VuZGEuIFByZXNlbnRhdGlvbnMgaGln aGxpZ2h0aW5nIGN1cnJlbnQgcmVzZWFyY2ggaW4gU0ROIGFuZCBpdHMgYXBwbGljYXRpb25zIGFy ZSBlbmNvdXJhZ2VkLiBBcmVhcyBvZiBpbnRlcmVzdCBpbmNsdWRlIChidXQgYXJlIG5vdCBsaW1p dGVkIHRvKTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+PG86 cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gQ2xhc3Np ZmljYXRpb24gb2YgU0ROIG1vZGVscywgaW5jbHVkaW5nIERlZmluaXRpb25zLCBUYXhvbm9taWVz PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gU0ROIG1vZGVs IHNjYWxhYmlsaXR5IGFuZCBhcHBsaWNhYmlsaXR5PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+ PHNwYW4gbGFuZz0iRU4tR0IiPm8gU0ROIFNlY3VyaXR5PG86cD48L286cD48L3NwYW4+PC9wPg0K PHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gU0ROIFBvbGljeSA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+ DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+byBNdWx0aS1sYXllciBwcm9ncmFtbWFiaWxpdHkgYW5k IGZlZWRiYWNrIGNvbnRyb2wgc3lzdGVtczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFu IGxhbmc9IkVOLUdCIj5vIFN5c3RlbSBDb21wbGV4aXR5PG86cD48L286cD48L3NwYW4+PC9wPg0K PHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gTmV0d29yayBkZXNjcmlwdGlvbiBsYW5ndWFnZXMsIGFi c3RyYWN0aW9ucywgaW50ZXJmYWNlcyBhbmQ8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3Bh biBsYW5nPSJFTi1HQiI+Jm5ic3A7Jm5ic3A7IGNvbXBpbGVycyBpbmNsdWRpbmcgbWV0aG9kcyBh bmQgbWVjaGFuaXNtcyBmb3IgKG9uLWxpbmUpPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNw YW4gbGFuZz0iRU4tR0IiPiZuYnNwOyZuYnNwOyB2ZXJpZmljYXRpb24gb2YgY29ycmVjdCBvcGVy YXRpb24gb2YgbmV0d29yay9ub2RlIGZ1bmN0aW9uLg0KPG86cD48L286cD48L3NwYW4+PC9wPg0K PHA+PHNwYW4gbGFuZz0iRU4tR0IiPiZuYnNwO28gTWV0aG9kcyBmb3IgaW5jcmVhc2luZyB0aGUg ZGF0YS1hd2FyZW5lc3Mgb2YgdGhlIG5ldHdvcms8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48 c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4g bGFuZz0iRU4tR0IiPlBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRvIDxhIGhyZWY9Im1haWx0 bzpkLmtpbmdAbGFuY2FzdGVyLmFjLnVrIj4NCmQua2luZ0BsYW5jYXN0ZXIuYWMudWs8L2E+LiAm bmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4m bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPkNGUCBEZWFkbGlu ZSAjMTogUHJlc2VudGF0aW9uIFByb3Bvc2FsIChBYnN0cmFjdHMpIER1ZSBieSBPY3QgMjUuPG86 cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPkNGUCBEZWFkbGluZSAj MjogUHJlc2VudGF0aW9uIFNsaWRlcyBEdWUgMSBOb3YuIDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjxwPjxzcGFuIGxhbmc9IkVOLUdCIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cD48 c3BhbiBsYW5nPSJFTi1HQiI+QlIsIERhbi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3Bh biBsYW5nPSJFTi1HQiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rp dj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_E33E01DFD5BEA24B9F3F18671078951F653A195Ankgeml501mbschi_-- From nobody Fri Oct 9 01:32:03 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0532F1A88FC for ; Fri, 9 Oct 2015 01:32:02 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.42 X-Spam-Level: X-Spam-Status: No, score=-3.42 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_NEUTRAL=0.779] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xyKdhPuF0AcB for ; Fri, 9 Oct 2015 01:32:00 -0700 (PDT) Received: from ignavia.lancs.ac.uk (ignavia.lancs.ac.uk [148.88.25.16]) by ietfa.amsl.com (Postfix) with ESMTP id DA63E1A88F9 for ; Fri, 9 Oct 2015 01:31:59 -0700 (PDT) Received: from ex-1-ht0.lancs.ac.uk ([10.42.18.57] helo=EX-1-HT0.lancs.local) by ignavia.lancs.ac.uk with esmtp (Exim 4.72) (envelope-from ) id 1ZkT5q-0008PG-0L; Fri, 09 Oct 2015 09:31:58 +0100 Received: from EX-0-MB2.lancs.local ([fe80::9d98:936b:54d1:c531]) by EX-1-HT0.lancs.local ([fe80::d9e8:ad10:d075:a6b6%12]) with mapi id 14.03.0248.002; Fri, 9 Oct 2015 09:31:56 +0100 From: "King, Daniel" To: "Songhaibin (A)" , "sdn@irtf.org" Thread-Topic: SDNRG at IETF 94 - Call for Presentations Thread-Index: AdECbPUkpxTXwIu/SEKXbaD0gvwwSA== Content-Class: urn:content-classes:message Date: Fri, 9 Oct 2015 08:31:56 +0000 Message-ID: <65174429B5AF4C45BD0798810EC48E0A32482B02@EX-0-MB2.lancs.local> Accept-Language: en-GB, en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: x-iss-local-domain: 1 Content-Type: multipart/alternative; boundary="_000_65174429B5AF4C45BD0798810EC48E0A32482B02EX0MB2lancsloca_" MIME-Version: 1.0 Archived-At: Subject: Re: [Sdn] SDNRG at IETF 94 - Call for Presentations X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 08:32:02 -0000 --_000_65174429B5AF4C45BD0798810EC48E0A32482B02EX0MB2lancsloca_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgSGFpYmluLCBhbGwuDQoNCg0KDQpTcGVha2VycyBzaG91bGQgY29uc2lkZXIgUS9BIHRpbWUg aW4gdGhlaXIgc2xvdCByZXF1ZXN0LCBlc3BlY2lhbGx5IGlmIHRoZXkgaGF2ZSBvcGVuIGlzc3Vl cy9ncmFuZCBjaGFsbGVuZ2VzIHRoZXkgd2FudCB0byBoaWdobGlnaHQgYW5kIHNlZWsgb3Bpbmlv bnMgZnJvbSB0aGUgYXR0ZW5kZWVzIChlLmcuLCAxMC0xNSBtaW51dGVzIGZvciBwcmVzZW50YXRp b24gKzUgbWludXRlcyBmb3IgUS9BKS4gVGhlbiByZW1pbmQgbWluZGZ1bCBvZiB0aGVpciBhbGxv dHRlZCB0aW1lIGFuZCBlbnN1cmUgdGhleSBoYXZlIHRpbWUgZm9yIHRoZWlyIFEvQSBkdXJpbmcg dGhlIHNlc3Npb24uDQoNCg0KDQpXZSBoYXZlIG5vIHNwZWNpZmljIHRvcGljIGZvciBJRVRGIDk0 IGFuZCB3aWxsIHJlZHVjZSB0aGUgbnVtYmVyIG9mIGFnZW5kYSBpdGVtcy4gV2hpY2ggd2lsbCBl bnN1cmUgd2UgaGF2ZSBhZGRpdGlvbmFsIHRpbWUgZm9yIGRpc2N1c3Npb25zIGlmIHNwZWFrZXJz IG92ZXJydW4gdGhlaXIgc2xvdHMuDQoNCg0KDQpPbmUgZmluYWwgb2JzZXJ2YXRpb24sIEkgd291 bGQgc3Ryb25nbHkgc3VnZ2VzdCB0aGF0IHBhcnRpY2lwYW50cyBhbHNvIHVzZSB0aGUgU0ROIFJH IGxpc3QgdG8gaW5pdGlhdGUgYW5kL29yIGNvbnRpbnVlIGRpc2N1c3Npb25zLiBJdHMgYSByZXNv dXJjZSB0aGF04oCZcyByYXJlbHkgdXRpbGlzZWQuDQoNCg0KDQpCUiwgRGFuLg0KDQoNCg0KRnJv bTogU29uZ2hhaWJpbiAoQSkNClNlbnQ6IDA5IE9jdG9iZXIgMjAxNSAwOToyMw0KVG86IEtpbmcs IERhbmllbDtzZG5AaXJ0Zi5vcmcNClN1YmplY3Q6IFJFOiBTRE5SRyBhdCBJRVRGIDk0IC0gQ2Fs bCBmb3IgUHJlc2VudGF0aW9ucw0KDQoNCkRlYXIgRGFuLA0KDQpNeSBndXQgZmVlbGluZyBmcm9t IGxhc3QgU0ROUkcgbWVldGluZyB3YXMgdGhlcmUgd2VyZSBwbGVudHkgb2YgcHJlc2VudGF0aW9u cyBidXQgbGVmdCBubyB0aW1lIGZvciBkaXNjdXNzaW9uIG9mIGVhY2ggcHJlc2VudGF0aW9uLiBJ IGhvcGUgZm9yIFlva29oYW1hIG1lZXRpbmcsIHRoZXJlIHdpbGwgYmUgYSBsaXR0bGUgdGltZSBm b3IgZGlzY3Vzc2lvbiDimLoNCg0KQmVzdCBSZWdhcmRzIQ0KLUhhaWJpbg0KDQpGcm9tOiBzZG4g W21haWx0bzpzZG4tYm91bmNlc0BtYWlsLmlldGYub3JnXSBPbiBCZWhhbGYgT2YgS2luZywgRGFu aWVsDQpTZW50OiBXZWRuZXNkYXksIE9jdG9iZXIgMDcsIDIwMTUgMTE6NDQgUE0NClRvOiBzZG5A aXJ0Zi5vcmcNClN1YmplY3Q6IFtTZG5dIFNETlJHIGF0IElFVEYgOTQgLSBDYWxsIGZvciBQcmVz ZW50YXRpb25zDQoNCg0KSGkgQWxsLA0KDQoNCg0KSUVURiA5NCBpbiBZb2tvaGFtYSwgSmFwYW4u DQoNCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQoNCg0KDQpUaGUgU29m dHdhcmUgRGVmaW5lZCBOZXR3b3JraW5nIFJlc2VhcmNoIEdyb3VwIChTRE5SRykgd2lsbCBob2xk IGl0cyBuZXh0IG1lZXRpbmcgaW4gY29uanVuY3Rpb24gd2l0aCBJRVRGIDk0IG9uIE1vbmRheSwg Tm92ZW1iZXIgMiwgMjAxNSAoSlNUKS4NCg0KDQoNClRoZSBTRE5SRyBQcm9ncmFtIENvbW1pdHRl ZSBpcyBzZWVraW5nIHByb3Bvc2FscyBmb3IgcHJlc2VudGF0aW9ucyBmb3IgdGhlIElSVEYgU0RO UkcgYWdlbmRhLiBQcmVzZW50YXRpb25zIGhpZ2hsaWdodGluZyBjdXJyZW50IHJlc2VhcmNoIGlu IFNETiBhbmQgaXRzIGFwcGxpY2F0aW9ucyBhcmUgZW5jb3VyYWdlZC4gQXJlYXMgb2YgaW50ZXJl c3QgaW5jbHVkZSAoYnV0IGFyZSBub3QgbGltaXRlZCB0byk6DQoNCg0KDQpvIENsYXNzaWZpY2F0 aW9uIG9mIFNETiBtb2RlbHMsIGluY2x1ZGluZyBEZWZpbml0aW9ucywgVGF4b25vbWllcw0KDQpv IFNETiBtb2RlbCBzY2FsYWJpbGl0eSBhbmQgYXBwbGljYWJpbGl0eQ0KDQpvIFNETiBTZWN1cml0 eQ0KDQpvIFNETiBQb2xpY3kNCg0KbyBNdWx0aS1sYXllciBwcm9ncmFtbWFiaWxpdHkgYW5kIGZl ZWRiYWNrIGNvbnRyb2wgc3lzdGVtcw0KDQpvIFN5c3RlbSBDb21wbGV4aXR5DQoNCm8gTmV0d29y ayBkZXNjcmlwdGlvbiBsYW5ndWFnZXMsIGFic3RyYWN0aW9ucywgaW50ZXJmYWNlcyBhbmQNCg0K ICAgY29tcGlsZXJzIGluY2x1ZGluZyBtZXRob2RzIGFuZCBtZWNoYW5pc21zIGZvciAob24tbGlu ZSkNCg0KICAgdmVyaWZpY2F0aW9uIG9mIGNvcnJlY3Qgb3BlcmF0aW9uIG9mIG5ldHdvcmsvbm9k ZSBmdW5jdGlvbi4NCg0KIG8gTWV0aG9kcyBmb3IgaW5jcmVhc2luZyB0aGUgZGF0YS1hd2FyZW5l c3Mgb2YgdGhlIG5ldHdvcmsNCg0KDQoNClBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRvIGQu a2luZ0BsYW5jYXN0ZXIuYWMudWs8bWFpbHRvOmQua2luZ0BsYW5jYXN0ZXIuYWMudWs+Lg0KDQoN Cg0KQ0ZQIERlYWRsaW5lICMxOiBQcmVzZW50YXRpb24gUHJvcG9zYWwgKEFic3RyYWN0cykgRHVl IGJ5IE9jdCAyNS4NCg0KQ0ZQIERlYWRsaW5lICMyOiBQcmVzZW50YXRpb24gU2xpZGVzIER1ZSAx IE5vdi4NCg0KDQoNCkJSLCBEYW4uDQoNCg0KDQoNCg== --_000_65174429B5AF4C45BD0798810EC48E0A32482B02EX0MB2lancsloca_ Content-Type: text/html; charset="utf-8" Content-ID: <7F58D5428548984FB5752A3B7D93526A@exchange.lancs.ac.uk> Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseTpXaW5nZGluZ3M7DQoJcGFub3NlLTE6NSAwIDAgMCAwIDAgMCAwIDAg MDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgiOw0KCXBhbm9zZS0x OjIgNCA1IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpDYWxpYnJp Ow0KCXBhbm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1m YW1pbHk6VGFob21hOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDMgNSA0IDQgMiA0O30NCi8qIFN0eWxl IERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFs DQoJe21hcmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMS4w cHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1z b0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6IzA1NjNDMTsNCgl0 ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtG b2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Izk1NEY3MjsNCgl0ZXh0 LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnANCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1h cmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJ Zm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNv LXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6NjEy LjBwdCA3OTIuMHB0Ow0KCW1hcmdpbjo3Mi4wcHQgNzIuMHB0IDcyLjBwdCA3Mi4wcHQ7fQ0KZGl2 LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPg0KPC9oZWFk Pg0KPGJvZHkgbGFuZz0iRU4tR0IiIGxpbms9IiMwNTYzQzEiIHZsaW5rPSIjOTU0RjcyIj4NCjxk aXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cD5IaSBIYWliaW4sIGFsbC4gPC9wPg0KPHA+PG86 cD4mbmJzcDs8L286cD48L3A+DQo8cD5TcGVha2VycyBzaG91bGQgY29uc2lkZXIgUS9BIHRpbWUg aW4gdGhlaXIgc2xvdCByZXF1ZXN0LCBlc3BlY2lhbGx5IGlmIHRoZXkgaGF2ZSBvcGVuIGlzc3Vl cy9ncmFuZCBjaGFsbGVuZ2VzIHRoZXkgd2FudCB0byBoaWdobGlnaHQgYW5kIHNlZWsgb3Bpbmlv bnMgZnJvbSB0aGUgYXR0ZW5kZWVzIChlLmcuLCAxMC0xNSBtaW51dGVzIGZvciBwcmVzZW50YXRp b24gJiM0Mzs1IG1pbnV0ZXMgZm9yIFEvQSkuIFRoZW4gcmVtaW5kIG1pbmRmdWwgb2YgdGhlaXIN CiBhbGxvdHRlZCB0aW1lIGFuZCBlbnN1cmUgdGhleSBoYXZlIHRpbWUgZm9yIHRoZWlyIFEvQSBk dXJpbmcgdGhlIHNlc3Npb24uIDwvcD4NCjxwPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHA+V2Ug aGF2ZSBubyBzcGVjaWZpYyB0b3BpYyBmb3IgSUVURiA5NCBhbmQgd2lsbCByZWR1Y2UgdGhlIG51 bWJlciBvZiBhZ2VuZGEgaXRlbXMuIFdoaWNoIHdpbGwgZW5zdXJlIHdlIGhhdmUgYWRkaXRpb25h bCB0aW1lIGZvciBkaXNjdXNzaW9ucyBpZiBzcGVha2VycyBvdmVycnVuIHRoZWlyIHNsb3RzLjwv cD4NCjxwPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHA+T25lIGZpbmFsIG9ic2VydmF0aW9uLCBJ IHdvdWxkIHN0cm9uZ2x5IHN1Z2dlc3QgdGhhdCBwYXJ0aWNpcGFudHMgYWxzbyB1c2UgdGhlIFNE TiBSRyBsaXN0IHRvIGluaXRpYXRlIGFuZC9vciBjb250aW51ZSBkaXNjdXNzaW9ucy4gSXRzIGEg cmVzb3VyY2UgdGhhdOKAmXMgcmFyZWx5IHV0aWxpc2VkLg0KPC9wPg0KPHA+PG86cD4mbmJzcDs8 L286cD48L3A+DQo8cD5CUiwgRGFuLiA8L3A+DQo8cD48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxk aXYgc3R5bGU9Im1zby1lbGVtZW50OnBhcmEtYm9yZGVyLWRpdjtib3JkZXI6bm9uZTtib3JkZXIt dG9wOnNvbGlkICNFMUUxRTEgMS4wcHQ7cGFkZGluZzozLjBwdCAwY20gMGNtIDBjbSI+DQo8cCBz dHlsZT0iYm9yZGVyOm5vbmU7cGFkZGluZzowY20iPjxicj4NCjxiPkZyb206IDwvYj5Tb25naGFp YmluIChBKTxicj4NCjxiPlNlbnQ6IDwvYj4wOSBPY3RvYmVyIDIwMTUgMDk6MjM8YnI+DQo8Yj5U bzogPC9iPktpbmcsIERhbmllbDtzZG5AaXJ0Zi5vcmc8YnI+DQo8Yj5TdWJqZWN0OiA8L2I+UkU6 IFNETlJHIGF0IElFVEYgOTQgLSBDYWxsIGZvciBQcmVzZW50YXRpb25zPC9wPg0KPC9kaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVv dDssc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0 OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj5EZWFyIERhbiw8L3NwYW4+PHNwYW4gc3R5 bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZTox MC41cHQ7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+Jm5ic3A7PC9z cGFuPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+PG86cD48L286cD48 L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxl PSJmb250LXNpemU6MTAuNXB0O2NvbG9yOiMxRjQ5N0Q7bXNvLWZhcmVhc3QtbGFuZ3VhZ2U6Wkgt Q04iPk15IGd1dCBmZWVsaW5nIGZyb20gbGFzdCBTRE5SRyBtZWV0aW5nIHdhcyB0aGVyZSB3ZXJl IHBsZW50eSBvZiBwcmVzZW50YXRpb25zIGJ1dCBsZWZ0IG5vIHRpbWUgZm9yIGRpc2N1c3Npb24g b2YgZWFjaCBwcmVzZW50YXRpb24uIEkgaG9wZSBmb3IgWW9rb2hhbWENCiBtZWV0aW5nLCB0aGVy ZSB3aWxsIGJlIGEgbGl0dGxlIHRpbWUgZm9yIGRpc2N1c3Npb24gPC9zcGFuPjxzcGFuIGxhbmc9 IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTpXaW5nZGluZ3M7Y29s b3I6IzFGNDk3RDttc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+Sjwvc3Bhbj48c3BhbiBzdHls ZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEw LjVwdDtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDs8L3Nw YW4+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9InRleHQtYWxpZ246 anVzdGlmeTt0ZXh0LWp1c3RpZnk6aW50ZXItaWRlb2dyYXBoIj48c3BhbiBsYW5nPSJFTi1VUyIg c3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3RDttc28tZmFyZWFzdC1sYW5ndWFn ZTpaSC1DTiI+QmVzdCBSZWdhcmRzITwvc3Bhbj48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFu Z3VhZ2U6WkgtQ04iPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi IHN0eWxlPSJ0ZXh0LWFsaWduOmp1c3RpZnk7dGV4dC1qdXN0aWZ5OmludGVyLWlkZW9ncmFwaCI+ PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2NvbG9yOiMxRjQ5N0Q7 bXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPi1IYWliaW48L3NwYW4+PHNwYW4gc3R5bGU9Im1z by1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXpl OjEwLjVwdDtjb2xvcjojMUY0OTdEO21zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDs8 L3NwYW4+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBi bHVlIDEuNXB0O3BhZGRpbmc6MGNtIDBjbSAwY20gNC4wcHQiPg0KPGRpdj4NCjxkaXYgc3R5bGU9 ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5nOjMuMHB0 IDBjbSAwY20gMGNtIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIGxhbmc9IkVOLVVT IiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEmcXVvdDss c2Fucy1zZXJpZjttc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+RnJvbTo8L3NwYW4+PC9iPjxz cGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVv dDtUYWhvbWEmcXVvdDssc2Fucy1zZXJpZjttc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+IHNk biBbbWFpbHRvOnNkbi1ib3VuY2VzQG1haWwuaWV0Zi5vcmddDQo8Yj5PbiBCZWhhbGYgT2YgPC9i PktpbmcsIERhbmllbDxicj4NCjxiPlNlbnQ6PC9iPiBXZWRuZXNkYXksIE9jdG9iZXIgMDcsIDIw MTUgMTE6NDQgUE08YnI+DQo8Yj5Ubzo8L2I+IHNkbkBpcnRmLm9yZzxicj4NCjxiPlN1YmplY3Q6 PC9iPiBbU2RuXSBTRE5SRyBhdCBJRVRGIDk0IC0gQ2FsbCBmb3IgUHJlc2VudGF0aW9uczwvc3Bh bj48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n PSJFTi1VUyIgc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDs8L3NwYW4+ PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj48bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPkhpIEFs bCwgPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxh bmd1YWdlOlpILUNOIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHls ZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPklFVEYgOTQgaW4gWW9rb2hhbWEsIEphcGFu LiA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFu Z3VhZ2U6WkgtQ04iPi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPG86cD48 L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpI LUNOIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZh cmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPlRoZSBTb2Z0d2FyZSBEZWZpbmVkIE5ldHdvcmtpbmcgUmVz ZWFyY2ggR3JvdXAgKFNETlJHKSB3aWxsIGhvbGQgaXRzIG5leHQgbWVldGluZyBpbiBjb25qdW5j dGlvbiB3aXRoIElFVEYgOTQgb24gTW9uZGF5LCBOb3ZlbWJlciAyLCAyMDE1IChKU1QpLg0KPG86 cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdl OlpILUNOIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNv LWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPlRoZSBTRE5SRyBQcm9ncmFtIENvbW1pdHRlZSBpcyBz ZWVraW5nIHByb3Bvc2FscyBmb3IgcHJlc2VudGF0aW9ucyBmb3IgdGhlIElSVEYgU0ROUkcgYWdl bmRhLiBQcmVzZW50YXRpb25zIGhpZ2hsaWdodGluZyBjdXJyZW50IHJlc2VhcmNoIGluIFNETiBh bmQgaXRzIGFwcGxpY2F0aW9ucyBhcmUgZW5jb3VyYWdlZC4gQXJlYXMgb2YgaW50ZXJlc3QgaW5j bHVkZSAoYnV0DQogYXJlIG5vdCBsaW1pdGVkIHRvKTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8 cD48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPiZuYnNwOzxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1D TiI+byBDbGFzc2lmaWNhdGlvbiBvZiBTRE4gbW9kZWxzLCBpbmNsdWRpbmcgRGVmaW5pdGlvbnMs IFRheG9ub21pZXM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZh cmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPm8gU0ROIG1vZGVsIHNjYWxhYmlsaXR5IGFuZCBhcHBsaWNh YmlsaXR5PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0 LWxhbmd1YWdlOlpILUNOIj5vIFNETiBTZWN1cml0eTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw PjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+byBTRE4gUG9saWN5IDxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFn ZTpaSC1DTiI+byBNdWx0aS1sYXllciBwcm9ncmFtbWFiaWxpdHkgYW5kIGZlZWRiYWNrIGNvbnRy b2wgc3lzdGVtczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFy ZWFzdC1sYW5ndWFnZTpaSC1DTiI+byBTeXN0ZW0gQ29tcGxleGl0eTxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1DTiI+byBOZXR3 b3JrIGRlc2NyaXB0aW9uIGxhbmd1YWdlcywgYWJzdHJhY3Rpb25zLCBpbnRlcmZhY2VzIGFuZDxv OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFn ZTpaSC1DTiI+Jm5ic3A7Jm5ic3A7IGNvbXBpbGVycyBpbmNsdWRpbmcgbWV0aG9kcyBhbmQgbWVj aGFuaXNtcyBmb3IgKG9uLWxpbmUpPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5 bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDsmbmJzcDsgdmVyaWZpY2F0aW9u IG9mIGNvcnJlY3Qgb3BlcmF0aW9uIG9mIG5ldHdvcmsvbm9kZSBmdW5jdGlvbi4NCjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFyZWFzdC1sYW5ndWFnZTpaSC1D TiI+Jm5ic3A7byBNZXRob2RzIGZvciBpbmNyZWFzaW5nIHRoZSBkYXRhLWF3YXJlbmVzcyBvZiB0 aGUgbmV0d29yazxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJtc28tZmFy ZWFzdC1sYW5ndWFnZTpaSC1DTiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNw YW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj5QbGVhc2Ugc2VuZCB5b3VyIHBy b3Bvc2FscyB0byA8YSBocmVmPSJtYWlsdG86ZC5raW5nQGxhbmNhc3Rlci5hYy51ayI+DQpkLmtp bmdAbGFuY2FzdGVyLmFjLnVrPC9hPi4gJm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+ PHNwYW4gc3R5bGU9Im1zby1mYXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDs8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04i PkNGUCBEZWFkbGluZSAjMTogUHJlc2VudGF0aW9uIFByb3Bvc2FsIChBYnN0cmFjdHMpIER1ZSBi eSBPY3QgMjUuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1mYXJl YXN0LWxhbmd1YWdlOlpILUNOIj5DRlAgRGVhZGxpbmUgIzI6IFByZXNlbnRhdGlvbiBTbGlkZXMg RHVlIDEgTm92Lg0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5bGU9Im1zby1m YXJlYXN0LWxhbmd1YWdlOlpILUNOIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48 c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3VhZ2U6WkgtQ04iPkJSLCBEYW4uPG86cD48L286 cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8cD48c3BhbiBzdHlsZT0ibXNvLWZhcmVhc3QtbGFuZ3Vh Z2U6WkgtQ04iPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJz cDs8L286cD48L3A+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_65174429B5AF4C45BD0798810EC48E0A32482B02EX0MB2lancsloca_-- From nobody Fri Oct 9 01:57:34 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9227C1A8A66 for ; Fri, 9 Oct 2015 01:57:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GaoN6adCwMCL for ; Fri, 9 Oct 2015 01:57:26 -0700 (PDT) Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [119.145.14.66]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA40C1A8A4E for ; Fri, 9 Oct 2015 01:57:24 -0700 (PDT) Received: from 172.24.1.48 (EHLO nkgeml410-hub.china.huawei.com) ([172.24.1.48]) by szxrg03-dlp.huawei.com (MOS 4.4.3-GA FastPath queued) with ESMTP id BOP55972; Fri, 09 Oct 2015 16:57:05 +0800 (CST) Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.75]) by nkgeml410-hub.china.huawei.com ([10.98.56.41]) with mapi id 14.03.0235.001; Fri, 9 Oct 2015 16:56:59 +0800 From: "Songhaibin (A)" To: "King, Daniel" , "sdn@irtf.org" Thread-Topic: SDNRG at IETF 94 - Call for Presentations Thread-Index: AdECbPUkpxTXwIu/SEKXbaD0gvwwSAAAxh8A Date: Fri, 9 Oct 2015 08:56:59 +0000 Message-ID: References: <65174429B5AF4C45BD0798810EC48E0A32482B02@EX-0-MB2.lancs.local> In-Reply-To: <65174429B5AF4C45BD0798810EC48E0A32482B02@EX-0-MB2.lancs.local> Accept-Language: en-US, zh-CN Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.138.41.75] Content-Type: multipart/alternative; boundary="_000_E33E01DFD5BEA24B9F3F18671078951F653A19B9nkgeml501mbschi_" MIME-Version: 1.0 X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.56178162.00AE, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.2.75, so=2013-05-26 15:14:31, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 4755f5f7fd122beebbc796dfccc42f31 Archived-At: Subject: Re: [Sdn] SDNRG at IETF 94 - Call for Presentations X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 08:57:32 -0000 --_000_E33E01DFD5BEA24B9F3F18671078951F653A19B9nkgeml501mbschi_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgRGFuLA0KDQpUaGFuayB5b3UgZm9yIHRoZSBxdWljayByZXNwb25zZS4gSXQgc291bmRzIGdv b2QgdG8gbWUgdGhhdCBwcmVzZW50ZXJzIHNob3VsZCBjb250cm9sIHRoZWlyIHRpbWUgaWYgdGhl eSBuZWVkIHNldmVyYWwgbWludXRlcyBmb3IgZGlzY3Vzc2lvbiBkdXJpbmcgdGhlaXIgc2xvdHMu DQoNCkkgYWdyZWUgd2l0aCB5b3UgdGhhdCB0aGUgbWFpbGluZyBsaXN0IHNob3VsZCBiZSB1c2Vk IG1vcmUgb2Z0ZW4gdGhhbiBpdCB3YXMuDQoNClRoYW5rcyBhZ2Fpbi4NCg0KQmVzdCBSZWdhcmRz IQ0KLUhhaWJpbg0KDQpGcm9tOiBLaW5nLCBEYW5pZWwgW21haWx0bzpkLmtpbmdAbGFuY2FzdGVy LmFjLnVrXQ0KU2VudDogRnJpZGF5LCBPY3RvYmVyIDA5LCAyMDE1IDQ6MzIgUE0NClRvOiBTb25n aGFpYmluIChBKTsgc2RuQGlydGYub3JnDQpTdWJqZWN0OiBSRTogU0ROUkcgYXQgSUVURiA5NCAt IENhbGwgZm9yIFByZXNlbnRhdGlvbnMNCg0KDQpIaSBIYWliaW4sIGFsbC4NCg0KDQoNClNwZWFr ZXJzIHNob3VsZCBjb25zaWRlciBRL0EgdGltZSBpbiB0aGVpciBzbG90IHJlcXVlc3QsIGVzcGVj aWFsbHkgaWYgdGhleSBoYXZlIG9wZW4gaXNzdWVzL2dyYW5kIGNoYWxsZW5nZXMgdGhleSB3YW50 IHRvIGhpZ2hsaWdodCBhbmQgc2VlayBvcGluaW9ucyBmcm9tIHRoZSBhdHRlbmRlZXMgKGUuZy4s IDEwLTE1IG1pbnV0ZXMgZm9yIHByZXNlbnRhdGlvbiArNSBtaW51dGVzIGZvciBRL0EpLiBUaGVu IHJlbWluZCBtaW5kZnVsIG9mIHRoZWlyIGFsbG90dGVkIHRpbWUgYW5kIGVuc3VyZSB0aGV5IGhh dmUgdGltZSBmb3IgdGhlaXIgUS9BIGR1cmluZyB0aGUgc2Vzc2lvbi4NCg0KDQoNCldlIGhhdmUg bm8gc3BlY2lmaWMgdG9waWMgZm9yIElFVEYgOTQgYW5kIHdpbGwgcmVkdWNlIHRoZSBudW1iZXIg b2YgYWdlbmRhIGl0ZW1zLiBXaGljaCB3aWxsIGVuc3VyZSB3ZSBoYXZlIGFkZGl0aW9uYWwgdGlt ZSBmb3IgZGlzY3Vzc2lvbnMgaWYgc3BlYWtlcnMgb3ZlcnJ1biB0aGVpciBzbG90cy4NCg0KDQoN Ck9uZSBmaW5hbCBvYnNlcnZhdGlvbiwgSSB3b3VsZCBzdHJvbmdseSBzdWdnZXN0IHRoYXQgcGFy dGljaXBhbnRzIGFsc28gdXNlIHRoZSBTRE4gUkcgbGlzdCB0byBpbml0aWF0ZSBhbmQvb3IgY29u dGludWUgZGlzY3Vzc2lvbnMuIEl0cyBhIHJlc291cmNlIHRoYXTigJlzIHJhcmVseSB1dGlsaXNl ZC4NCg0KDQoNCkJSLCBEYW4uDQoNCg0KDQpGcm9tOiBTb25naGFpYmluIChBKQ0KU2VudDogMDkg T2N0b2JlciAyMDE1IDA5OjIzDQpUbzogS2luZywgRGFuaWVsO3NkbkBpcnRmLm9yZw0KU3ViamVj dDogUkU6IFNETlJHIGF0IElFVEYgOTQgLSBDYWxsIGZvciBQcmVzZW50YXRpb25zDQoNCg0KRGVh ciBEYW4sDQoNCk15IGd1dCBmZWVsaW5nIGZyb20gbGFzdCBTRE5SRyBtZWV0aW5nIHdhcyB0aGVy ZSB3ZXJlIHBsZW50eSBvZiBwcmVzZW50YXRpb25zIGJ1dCBsZWZ0IG5vIHRpbWUgZm9yIGRpc2N1 c3Npb24gb2YgZWFjaCBwcmVzZW50YXRpb24uIEkgaG9wZSBmb3IgWW9rb2hhbWEgbWVldGluZywg dGhlcmUgd2lsbCBiZSBhIGxpdHRsZSB0aW1lIGZvciBkaXNjdXNzaW9uIOKYug0KDQpCZXN0IFJl Z2FyZHMhDQotSGFpYmluDQoNCkZyb206IHNkbiBbbWFpbHRvOnNkbi1ib3VuY2VzQG1haWwuaWV0 Zi5vcmddIE9uIEJlaGFsZiBPZiBLaW5nLCBEYW5pZWwNClNlbnQ6IFdlZG5lc2RheSwgT2N0b2Jl ciAwNywgMjAxNSAxMTo0NCBQTQ0KVG86IHNkbkBpcnRmLm9yZzxtYWlsdG86c2RuQGlydGYub3Jn Pg0KU3ViamVjdDogW1Nkbl0gU0ROUkcgYXQgSUVURiA5NCAtIENhbGwgZm9yIFByZXNlbnRhdGlv bnMNCg0KDQpIaSBBbGwsDQoNCg0KDQpJRVRGIDk0IGluIFlva29oYW1hLCBKYXBhbi4NCg0KLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCg0KDQoNClRoZSBTb2Z0d2FyZSBE ZWZpbmVkIE5ldHdvcmtpbmcgUmVzZWFyY2ggR3JvdXAgKFNETlJHKSB3aWxsIGhvbGQgaXRzIG5l eHQgbWVldGluZyBpbiBjb25qdW5jdGlvbiB3aXRoIElFVEYgOTQgb24gTW9uZGF5LCBOb3ZlbWJl ciAyLCAyMDE1IChKU1QpLg0KDQoNCg0KVGhlIFNETlJHIFByb2dyYW0gQ29tbWl0dGVlIGlzIHNl ZWtpbmcgcHJvcG9zYWxzIGZvciBwcmVzZW50YXRpb25zIGZvciB0aGUgSVJURiBTRE5SRyBhZ2Vu ZGEuIFByZXNlbnRhdGlvbnMgaGlnaGxpZ2h0aW5nIGN1cnJlbnQgcmVzZWFyY2ggaW4gU0ROIGFu ZCBpdHMgYXBwbGljYXRpb25zIGFyZSBlbmNvdXJhZ2VkLiBBcmVhcyBvZiBpbnRlcmVzdCBpbmNs dWRlIChidXQgYXJlIG5vdCBsaW1pdGVkIHRvKToNCg0KDQoNCm8gQ2xhc3NpZmljYXRpb24gb2Yg U0ROIG1vZGVscywgaW5jbHVkaW5nIERlZmluaXRpb25zLCBUYXhvbm9taWVzDQoNCm8gU0ROIG1v ZGVsIHNjYWxhYmlsaXR5IGFuZCBhcHBsaWNhYmlsaXR5DQoNCm8gU0ROIFNlY3VyaXR5DQoNCm8g U0ROIFBvbGljeQ0KDQpvIE11bHRpLWxheWVyIHByb2dyYW1tYWJpbGl0eSBhbmQgZmVlZGJhY2sg Y29udHJvbCBzeXN0ZW1zDQoNCm8gU3lzdGVtIENvbXBsZXhpdHkNCg0KbyBOZXR3b3JrIGRlc2Ny aXB0aW9uIGxhbmd1YWdlcywgYWJzdHJhY3Rpb25zLCBpbnRlcmZhY2VzIGFuZA0KDQogICBjb21w aWxlcnMgaW5jbHVkaW5nIG1ldGhvZHMgYW5kIG1lY2hhbmlzbXMgZm9yIChvbi1saW5lKQ0KDQog ICB2ZXJpZmljYXRpb24gb2YgY29ycmVjdCBvcGVyYXRpb24gb2YgbmV0d29yay9ub2RlIGZ1bmN0 aW9uLg0KDQogbyBNZXRob2RzIGZvciBpbmNyZWFzaW5nIHRoZSBkYXRhLWF3YXJlbmVzcyBvZiB0 aGUgbmV0d29yaw0KDQoNCg0KUGxlYXNlIHNlbmQgeW91ciBwcm9wb3NhbHMgdG8gZC5raW5nQGxh bmNhc3Rlci5hYy51azxtYWlsdG86ZC5raW5nQGxhbmNhc3Rlci5hYy51az4uDQoNCg0KDQpDRlAg RGVhZGxpbmUgIzE6IFByZXNlbnRhdGlvbiBQcm9wb3NhbCAoQWJzdHJhY3RzKSBEdWUgYnkgT2N0 IDI1Lg0KDQpDRlAgRGVhZGxpbmUgIzI6IFByZXNlbnRhdGlvbiBTbGlkZXMgRHVlIDEgTm92Lg0K DQoNCg0KQlIsIERhbi4NCg0KDQoNCg0K --_000_E33E01DFD5BEA24B9F3F18671078951F653A19B9nkgeml501mbschi_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 V2luZ2RpbmdzOw0KCXBhbm9zZS0xOjUgMCAwIDAgMCAwIDAgMCAwIDA7fQ0KQGZvbnQtZmFjZQ0K CXtmb250LWZhbWlseTrlrovkvZM7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQpA Zm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgiOw0KCXBhbm9zZS0xOjIgNCA1 IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpDYWxpYnJpOw0KCXBh bm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IlxA5a6L5L2TIjsNCglwYW5vc2UtMToyIDEgNiAwIDMgMSAxIDEgMSAxO30NCkBmb250LWZhY2UN Cgl7Zm9udC1mYW1pbHk6VGFob21hOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDMgNSA0IDQgMiA0O30N Ci8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYu TXNvTm9ybWFsDQoJe21hcmdpbjowY207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQt c2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjt9DQphOmxp bmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjoj MDU2M0MxOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1z b0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjojOTU0 RjcyOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcA0KCXttc28tc3R5bGUtcHJpb3Jp dHk6OTk7DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXpl OjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCnAuTXNvQWNl dGF0ZSwgbGkuTXNvQWNldGF0ZSwgZGl2Lk1zb0FjZXRhdGUNCgl7bXNvLXN0eWxlLXByaW9yaXR5 Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiLmibnms6jmoYbmlofmnKwgQ2hhciI7DQoJbWFyZ2luOjBj bTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjkuMHB0Ow0KCWZvbnQtZmFt aWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTgNCgl7bXNvLXN0 eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNl cmlmIjsNCgljb2xvcjojMUY0OTdEO30NCnNwYW4uQ2hhcg0KCXttc28tc3R5bGUtbmFtZToi5om5 5rOo5qGG5paH5pysIENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUt bGluazrmibnms6jmoYbmlofmnKw7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlm Ijt9DQouTXNvQ2hwRGVmYXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250 LXNpemU6MTAuMHB0O30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBw dDsNCgltYXJnaW46NzIuMHB0IDcyLjBwdCA3Mi4wcHQgNzIuMHB0O30NCmRpdi5Xb3JkU2VjdGlv bjENCgl7cGFnZTpXb3JkU2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+ PHhtbD4NCjxvOnNoYXBlZGVmYXVsdHMgdjpleHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8 L3htbD48IVtlbmRpZl0tLT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0 IHY6ZXh0PSJlZGl0Ij4NCjxvOmlkbWFwIHY6ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNo YXBlbGF5b3V0PjwveG1sPjwhW2VuZGlmXS0tPg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iWkgtQ04i IGxpbms9IiMwNTYzQzEiIHZsaW5rPSIjOTU0RjcyIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9u MSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt c2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3RCI+SGkgRGFuLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXpl OjEwLjVwdDtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41 cHQ7Y29sb3I6IzFGNDk3RCI+VGhhbmsgeW91IGZvciB0aGUgcXVpY2sgcmVzcG9uc2UuIEl0IHNv dW5kcyBnb29kIHRvIG1lIHRoYXQgcHJlc2VudGVycyBzaG91bGQgY29udHJvbCB0aGVpciB0aW1l IGlmIHRoZXkgbmVlZCBzZXZlcmFsIG1pbnV0ZXMgZm9yIGRpc2N1c3Npb24gZHVyaW5nIHRoZWly IHNsb3RzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj48bzpw PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n PSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3RCI+SSBhZ3JlZSB3 aXRoIHlvdSB0aGF0IHRoZSBtYWlsaW5nIGxpc3Qgc2hvdWxkIGJlIHVzZWQgbW9yZSBvZnRlbiB0 aGFuIGl0IHdhcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3RCI+ PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g bGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2NvbG9yOiMxRjQ5N0QiPlRoYW5r cyBhZ2Fpbi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh biBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3RCI+PG86 cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0 eWxlPSJ0ZXh0LWFsaWduOmp1c3RpZnk7dGV4dC1qdXN0aWZ5OmludGVyLWlkZW9ncmFwaCI+PHNw YW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2NvbG9yOiMxRjQ5N0QiPkJl c3QgUmVnYXJkcyE8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz dHlsZT0idGV4dC1hbGlnbjpqdXN0aWZ5O3RleHQtanVzdGlmeTppbnRlci1pZGVvZ3JhcGgiPjxz cGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj4t SGFpYmluPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Y29sb3I6IzFGNDk3 RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7 Ym9yZGVyLWxlZnQ6c29saWQgYmx1ZSAxLjVwdDtwYWRkaW5nOjBjbSAwY20gMGNtIDQuMHB0Ij4N CjxkaXY+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNCNUM0REYg MS4wcHQ7cGFkZGluZzozLjBwdCAwY20gMGNtIDBjbSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48 Yj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPkZyb206PC9zcGFuPjwv Yj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPiBLaW5nLCBEYW5pZWwg W21haWx0bzpkLmtpbmdAbGFuY2FzdGVyLmFjLnVrXQ0KPGJyPg0KPGI+U2VudDo8L2I+IEZyaWRh eSwgT2N0b2JlciAwOSwgMjAxNSA0OjMyIFBNPGJyPg0KPGI+VG86PC9iPiBTb25naGFpYmluIChB KTsgc2RuQGlydGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IFJFOiBTRE5SRyBhdCBJRVRGIDk0 IC0gQ2FsbCBmb3IgUHJlc2VudGF0aW9uczxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K PC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJz cDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPkhpIEhhaWJpbiwgYWxs LiA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4mbmJz cDs8L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPlNwZWFrZXJzIHNob3Vs ZCBjb25zaWRlciBRL0EgdGltZSBpbiB0aGVpciBzbG90IHJlcXVlc3QsIGVzcGVjaWFsbHkgaWYg dGhleSBoYXZlIG9wZW4gaXNzdWVzL2dyYW5kIGNoYWxsZW5nZXMgdGhleSB3YW50IHRvIGhpZ2hs aWdodCBhbmQgc2VlayBvcGluaW9ucyBmcm9tIHRoZSBhdHRlbmRlZXMgKGUuZy4sIDEwLTE1IG1p bnV0ZXMgZm9yIHByZXNlbnRhdGlvbiAmIzQzOzUgbWludXRlcyBmb3IgUS9BKS4gVGhlbiByZW1p bmQNCiBtaW5kZnVsIG9mIHRoZWlyIGFsbG90dGVkIHRpbWUgYW5kIGVuc3VyZSB0aGV5IGhhdmUg dGltZSBmb3IgdGhlaXIgUS9BIGR1cmluZyB0aGUgc2Vzc2lvbi4NCjxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+ DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+V2UgaGF2ZSBubyBzcGVjaWZpYyB0b3BpYyBmb3IgSUVU RiA5NCBhbmQgd2lsbCByZWR1Y2UgdGhlIG51bWJlciBvZiBhZ2VuZGEgaXRlbXMuIFdoaWNoIHdp bGwgZW5zdXJlIHdlIGhhdmUgYWRkaXRpb25hbCB0aW1lIGZvciBkaXNjdXNzaW9ucyBpZiBzcGVh a2VycyBvdmVycnVuIHRoZWlyIHNsb3RzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFu IGxhbmc9IkVOLUdCIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5n PSJFTi1HQiI+T25lIGZpbmFsIG9ic2VydmF0aW9uLCBJIHdvdWxkIHN0cm9uZ2x5IHN1Z2dlc3Qg dGhhdCBwYXJ0aWNpcGFudHMgYWxzbyB1c2UgdGhlIFNETiBSRyBsaXN0IHRvIGluaXRpYXRlIGFu ZC9vciBjb250aW51ZSBkaXNjdXNzaW9ucy4gSXRzIGEgcmVzb3VyY2UgdGhhdOKAmXMgcmFyZWx5 IHV0aWxpc2VkLg0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0Ii PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj5CUiwg RGFuLiA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4m bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRv cDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20iPg0KPHA+PHNw YW4gbGFuZz0iRU4tR0IiPjxicj4NCjxiPkZyb206IDwvYj5Tb25naGFpYmluIChBKTxicj4NCjxi PlNlbnQ6IDwvYj4wOSBPY3RvYmVyIDIwMTUgMDk6MjM8YnI+DQo8Yj5UbzogPC9iPktpbmcsIERh bmllbDtzZG5AaXJ0Zi5vcmc8YnI+DQo8Yj5TdWJqZWN0OiA8L2I+UkU6IFNETlJHIGF0IElFVEYg OTQgLSBDYWxsIGZvciBQcmVzZW50YXRpb25zPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4mbmJzcDs8L286 cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tR0IiIHN0 eWxlPSJmb250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssJnF1b3Q7c2VyaWYm cXVvdDsiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdE Ij5EZWFyIERhbiw8L3NwYW4+PHNwYW4gbGFuZz0iRU4tR0IiPjxvOnA+PC9vOnA+PC9zcGFuPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1z aXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PHNwYW4gbGFuZz0iRU4tR0Ii PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9 IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj5NeSBndXQgZmVl bGluZyBmcm9tIGxhc3QgU0ROUkcgbWVldGluZyB3YXMgdGhlcmUgd2VyZSBwbGVudHkgb2YgcHJl c2VudGF0aW9ucyBidXQgbGVmdCBubyB0aW1lIGZvciBkaXNjdXNzaW9uIG9mIGVhY2ggcHJlc2Vu dGF0aW9uLiBJIGhvcGUgZm9yIFlva29oYW1hIG1lZXRpbmcsIHRoZXJlIHdpbGwgYmUgYSBsaXR0 bGUNCiB0aW1lIGZvciBkaXNjdXNzaW9uIDwvc3Bhbj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9 ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6V2luZ2RpbmdzO2NvbG9yOiMxRjQ5N0QiPko8 L3NwYW4+PHNwYW4gbGFuZz0iRU4tR0IiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtj b2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PHNwYW4gbGFuZz0iRU4tR0IiPjxvOnA+PC9vOnA+ PC9zcGFuPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0idGV4dC1hbGln bjpqdXN0aWZ5O3RleHQtanVzdGlmeTppbnRlci1pZGVvZ3JhcGgiPjxzcGFuIGxhbmc9IkVOLVVT IiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj5CZXN0IFJlZ2FyZHMhPC9z cGFuPjxzcGFuIGxhbmc9IkVOLUdCIj48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIiBzdHlsZT0idGV4dC1hbGlnbjpqdXN0aWZ5O3RleHQtanVzdGlmeTppbnRlci1p ZGVvZ3JhcGgiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xv cjojMUY0OTdEIj4tSGFpYmluPC9zcGFuPjxzcGFuIGxhbmc9IkVOLUdCIj48bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVT IiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtjb2xvcjojMUY0OTdEIj4mbmJzcDs8L3NwYW4+PHNw YW4gbGFuZz0iRU4tR0IiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXYgc3R5bGU9ImJvcmRl cjpub25lO2JvcmRlci1sZWZ0OnNvbGlkIGJsdWUgMS41cHQ7cGFkZGluZzowY20gMGNtIDBjbSA0 LjBwdCI+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAj QjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20iPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PGI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5Gcm9tOjwv c3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O1RhaG9tYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij4gc2RuIFs8 YSBocmVmPSJtYWlsdG86c2RuLWJvdW5jZXNAbWFpbC5pZXRmLm9yZyI+bWFpbHRvOnNkbi1ib3Vu Y2VzQG1haWwuaWV0Zi5vcmc8L2E+XQ0KPGI+T24gQmVoYWxmIE9mIDwvYj5LaW5nLCBEYW5pZWw8 YnI+DQo8Yj5TZW50OjwvYj4gV2VkbmVzZGF5LCBPY3RvYmVyIDA3LCAyMDE1IDExOjQ0IFBNPGJy Pg0KPGI+VG86PC9iPiA8YSBocmVmPSJtYWlsdG86c2RuQGlydGYub3JnIj5zZG5AaXJ0Zi5vcmc8 L2E+PGJyPg0KPGI+U3ViamVjdDo8L2I+IFtTZG5dIFNETlJHIGF0IElFVEYgOTQgLSBDYWxsIGZv ciBQcmVzZW50YXRpb25zPC9zcGFuPjxzcGFuIGxhbmc9IkVOLUdCIj48bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i RU4tVVMiPiZuYnNwOzwvc3Bhbj48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD48L286cD48L3NwYW4+ PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPkhpIEFsbCwgPG86cD48L286cD48L3NwYW4+PC9w Pg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw PjxzcGFuIGxhbmc9IkVOLUdCIj5JRVRGIDk0IGluIFlva29oYW1hLCBKYXBhbi4gPG86cD48L286 cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPi0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0i RU4tR0IiPiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdC Ij5UaGUgU29mdHdhcmUgRGVmaW5lZCBOZXR3b3JraW5nIFJlc2VhcmNoIEdyb3VwIChTRE5SRykg d2lsbCBob2xkIGl0cyBuZXh0IG1lZXRpbmcgaW4gY29uanVuY3Rpb24gd2l0aCBJRVRGIDk0IG9u IE1vbmRheSwgTm92ZW1iZXIgMiwgMjAxNSAoSlNUKS4NCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjxwPjxzcGFuIGxhbmc9IkVOLUdCIj4mbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48 c3BhbiBsYW5nPSJFTi1HQiI+VGhlIFNETlJHIFByb2dyYW0gQ29tbWl0dGVlIGlzIHNlZWtpbmcg cHJvcG9zYWxzIGZvciBwcmVzZW50YXRpb25zIGZvciB0aGUgSVJURiBTRE5SRyBhZ2VuZGEuIFBy ZXNlbnRhdGlvbnMgaGlnaGxpZ2h0aW5nIGN1cnJlbnQgcmVzZWFyY2ggaW4gU0ROIGFuZCBpdHMg YXBwbGljYXRpb25zIGFyZSBlbmNvdXJhZ2VkLiBBcmVhcyBvZiBpbnRlcmVzdCBpbmNsdWRlIChi dXQgYXJlIG5vdCBsaW1pdGVkIHRvKTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBs YW5nPSJFTi1HQiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0i RU4tR0IiPm8gQ2xhc3NpZmljYXRpb24gb2YgU0ROIG1vZGVscywgaW5jbHVkaW5nIERlZmluaXRp b25zLCBUYXhvbm9taWVzPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4t R0IiPm8gU0ROIG1vZGVsIHNjYWxhYmlsaXR5IGFuZCBhcHBsaWNhYmlsaXR5PG86cD48L286cD48 L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gU0ROIFNlY3VyaXR5PG86cD48L286 cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gU0ROIFBvbGljeSA8bzpwPjwv bzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+byBNdWx0aS1sYXllciBwcm9n cmFtbWFiaWxpdHkgYW5kIGZlZWRiYWNrIGNvbnRyb2wgc3lzdGVtczxvOnA+PC9vOnA+PC9zcGFu PjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj5vIFN5c3RlbSBDb21wbGV4aXR5PG86cD48L286 cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPm8gTmV0d29yayBkZXNjcmlwdGlv biBsYW5ndWFnZXMsIGFic3RyYWN0aW9ucywgaW50ZXJmYWNlcyBhbmQ8bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+Jm5ic3A7Jm5ic3A7IGNvbXBpbGVycyBpbmNs dWRpbmcgbWV0aG9kcyBhbmQgbWVjaGFuaXNtcyBmb3IgKG9uLWxpbmUpPG86cD48L286cD48L3Nw YW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPiZuYnNwOyZuYnNwOyB2ZXJpZmljYXRpb24g b2YgY29ycmVjdCBvcGVyYXRpb24gb2YgbmV0d29yay9ub2RlIGZ1bmN0aW9uLg0KPG86cD48L286 cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPiZuYnNwO28gTWV0aG9kcyBmb3Ig aW5jcmVhc2luZyB0aGUgZGF0YS1hd2FyZW5lc3Mgb2YgdGhlIG5ldHdvcms8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+ PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0IiPlBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRv IDxhIGhyZWY9Im1haWx0bzpkLmtpbmdAbGFuY2FzdGVyLmFjLnVrIj4NCmQua2luZ0BsYW5jYXN0 ZXIuYWMudWs8L2E+LiAmbmJzcDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cD48c3BhbiBsYW5n PSJFTi1HQiI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4t R0IiPkNGUCBEZWFkbGluZSAjMTogUHJlc2VudGF0aW9uIFByb3Bvc2FsIChBYnN0cmFjdHMpIER1 ZSBieSBPY3QgMjUuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHA+PHNwYW4gbGFuZz0iRU4tR0Ii PkNGUCBEZWFkbGluZSAjMjogUHJlc2VudGF0aW9uIFNsaWRlcyBEdWUgMSBOb3YuIDxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj4mbmJzcDs8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cD48c3BhbiBsYW5nPSJFTi1HQiI+QlIsIERhbi48bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8L2Rpdj4NCjxwPjxzcGFuIGxhbmc9IkVOLUdCIj4mbmJzcDs8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1HQiI+PG86cD4m bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i RU4tR0IiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jv ZHk+DQo8L2h0bWw+DQo= --_000_E33E01DFD5BEA24B9F3F18671078951F653A19B9nkgeml501mbschi_-- From nobody Mon Oct 12 03:22:00 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEF8A1ACCE9 for ; Mon, 12 Oct 2015 03:21:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.611 X-Spam-Level: X-Spam-Status: No, score=-2.611 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wrDvW9k5Hrgw for ; Mon, 12 Oct 2015 03:21:54 -0700 (PDT) Received: from smtpjc.telefonica.com (smtpjc.telefonica.com [81.47.204.76]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C65A71ACCE6 for ; Mon, 12 Oct 2015 03:21:50 -0700 (PDT) Received: from smtpjc.telefonica.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 084492F01B4 for ; Mon, 12 Oct 2015 12:21:48 +0200 (CEST) Received: from ESTGVMSP114.EUROPE.telefonica.corp (unknown [10.92.4.9]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtpjc.telefonica.com (Postfix) with ESMTPS id E25CB2F00C8 for ; Mon, 12 Oct 2015 12:21:47 +0200 (CEST) Received: from emea01-am1-obe.outbound.protection.outlook.com (10.92.5.139) by tls.telefonica.com (10.93.6.55) with Microsoft SMTP Server (TLS) id 14.3.235.1; Mon, 12 Oct 2015 12:21:46 +0200 Received: from DB4PR06MB0639.eurprd06.prod.outlook.com (10.161.13.145) by DB4PR06MB0638.eurprd06.prod.outlook.com (10.161.13.144) with Microsoft SMTP Server (TLS) id 15.1.293.16; Mon, 12 Oct 2015 10:21:45 +0000 Received: from DB4PR06MB0639.eurprd06.prod.outlook.com ([10.161.13.145]) by DB4PR06MB0639.eurprd06.prod.outlook.com ([10.161.13.145]) with mapi id 15.01.0293.007; Mon, 12 Oct 2015 10:21:45 +0000 From: PEDRO ANDRES ARANDA GUTIERREZ To: "sdn@mail.ietf.org" Thread-Topic: Requesting presentation slot Thread-Index: AQHRBNfLYz7PN1q0XkO7leEXgZZvfw== Date: Mon, 12 Oct 2015 10:21:45 +0000 Message-ID: Accept-Language: es-ES, en-US Content-Language: es-ES X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/0.0.0.150923 authentication-results: spf=none (sender IP is ) smtp.mailfrom=pedroa.aranda@telefonica.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [83.50.99.12] x-microsoft-exchange-diagnostics: 1; DB4PR06MB0638; 5:KyfH7/tDxcHiBlqgTTPL1uVRiwmlwWKgQtnn5DMgCWDwO/4MvsDhiZuZh7qrIwdNpybsUO1O0oFiqpMavubb/hUV6Yx0fdOOBNNe8Ay/nRn0ShdOok+eM2Z5+vOhZMkyS2TUp7grVKCiEmG0DAEOMQ==; 24:iZwjPHusMU1xYzK1+gUBYt7WsEJuYyxc2ULLAbWt7xlJCSqN5+lMuXLHQN+pTPhR9bxHVZY66Nq+Zqp0fCp86F8Fvtpi7kdz1Z5Pb/ytlYg=; 20:aH3yWhqmmMtkVP+HMYJWAVdSiZQah0LjRLUrBXs4d9QEoVv4gr1gWHdGSw1jK5qvAZaOQI7jyaFl7UvjMjT6DQ== x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(42134001)(42139001); SRVR:DB4PR06MB0638; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(43874152186217); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(520078)(3002001); SRVR:DB4PR06MB0638; BCL:0; PCL:0; RULEID:; SRVR:DB4PR06MB0638; x-forefront-prvs: 0727122FC6 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(59124003)(27574002)(53754006)(189002)(199003)(106356001)(36756003)(81156007)(19580405001)(46102003)(229853001)(10400500002)(5008740100001)(5007970100001)(5001920100001)(15975445007)(5004730100002)(575784001)(92566002)(106116001)(102836002)(19580395003)(105586002)(82746002)(86362001)(122556002)(2351001)(4001350100001)(66066001)(97736004)(83716003)(5001960100002)(50986999)(2501003)(54356999)(107886002)(83506001)(512874002)(110136002)(87936001)(101416001)(450100001)(77096005)(561944003)(33656002)(5002640100001)(189998001)(11100500001)(5890100001)(64706001)(40100003)(2900100001)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:DB4PR06MB0638; H:DB4PR06MB0639.eurprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Oct 2015 10:21:45.3721 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR06MB0638 X-OriginatorOrg: telefonica.com X-TM-AS-MML: No Archived-At: Subject: [Sdn] Requesting presentation slot X-BeenThere: sdn@mail.ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 10:21:58 -0000 SGksDQoNCkkgd291bGQgbGlrZSB0byBhc2sgZm9yIGEgc2xvdCB0byBwcmVzZW50IHRoZSBTVVBF UkZMVUlESVRZIHByb2plY3QuIEl04oCZcyBhbiBIMjAyMCBQcm9qZWN0IGNvLWZpbmFuY2VkIGJ5 IHRoZSBFVSB0aGF0IGhhcyBqdXN0IHN0YXJ0ZWQgYW5kIGl0cyBvYmplY3RpdmUgaXMgdG8gd29y ayBhbiBhcmNoaXRlY3R1cmUgdGhhdCBjYW4gY29wZSB3aXRoIHRoZSByZXF1aXJlbWVudHMgZm9y IDVHIG5ldHdvcmtzIHdpdGggcmVnYXJkcyB0byBzY2FsYWJpbGl0eSwgYWdpbGl0eSBhbmQgdGhl IHNlcnZpY2UgbGV2ZWxzIGV4cGVjdGVkIGZvciBzdWNoIG5ldHdvcmtzLiBJbiBteSB0YWxrLCBJ IHdpbGwgZXhwbGFpbiB0aGUgcHJvamVjdCBvYmplY3RpdmVzLCBwdXQgdGhlIHByb2plY3QgaW4g cGVyc3BlY3RpdmUgd2l0aCB0aGUgSUVURi9JUlRGIGFuZCBvdGhlciBTdGFuZGFyZCBEZWZpbmlu ZyBPcmdhbmlzYXRpb25zIGFuZCBwcm9wb3NlIGhvdyB0aGUgU0ROUkcsIGluIHBhcnRpY3VsYXIs IGNvdWxkIGJlbmVmaXQgZnJvbSB0aGUgcHJvamVjdOKAmXMgb3V0Y29tZXMgdG8gc3RlZXIgZnV0 dXJlIHdvcmtpbmcgZGlyZWN0aW9ucy4NCg0KQmVzdCByZWdhcmRzLCAvUEENCi0tLQ0KRHIuIFBl ZHJvIEEuIEFyYW5kYSBHdXRpw6lycmV6DQoNClRlY2hub2xvZ3kgRXhwbG9yYXRpb24gLQ0KTmV0 d29yayBJbm5vdmF0aW9uICYgVmlydHVhbGlzYXRpb24NCmVtYWlsOiBwZWRyb2EgZDB0IGFyYW5k YSBBdCB0ZWxlZm9uaWNhIGQwdCBjb20NClRlbGVmw7NuaWNhLCBJbnZlc3RpZ2FjacOzbiB5IERl c2Fycm9sbG8NCkMvIFp1cmJhcsOhbiwxMg0KMjgwMTAgTWFkcmlkLCBTcGFpbg0KDQpGcmFnZW4g c2luZCBuaWNodCBkYSwgdW0gYmVhbnR3b3J0ZXQgenUgd2VyZGVuLg0KRnJhZ2VuIHNpbmQgZGEs IHVtIGdlc3RlbGx0IHp1IHdlcmRlbi4NCkdlb3JnIEtyZWlzbGVyDQoNCg0KDQoNCg0KDQoNCg0K LS0tLS1NZW5zYWplIG9yaWdpbmFsLS0tLS0NCkRlOiBzZG4gZW4gbm9tYnJlIGRlICJzZG4tcmVx dWVzdEBtYWlsLmlldGYub3JnIg0KUmVzcG9uZGVyIGE6ICJzZG5AbWFpbC5pZXRmLm9yZyINCkZl Y2hhOiBtacOpcmNvbGVzLCA3IGRlIG9jdHVicmUgZGUgMjAxNSwgMjE6MDANClBhcmE6ICJzZG5A bWFpbC5pZXRmLm9yZyINCkFzdW50bzogc2RuIERpZ2VzdCwgVm9sIDQxLCBJc3N1ZSAzDQoNCj5T ZW5kIHNkbiBtYWlsaW5nIGxpc3Qgc3VibWlzc2lvbnMgdG8NCj4gICAgICAgc2RuQG1haWwuaWV0 Zi5vcmcNCj4NCj5UbyBzdWJzY3JpYmUgb3IgdW5zdWJzY3JpYmUgdmlhIHRoZSBXb3JsZCBXaWRl IFdlYiwgdmlzaXQNCj4gICAgICAgaHR0cHM6Ly9tYWlsLmlldGYub3JnL21haWxtYW4vbGlzdGlu Zm8vc2RuDQo+b3IsIHZpYSBlbWFpbCwgc2VuZCBhIG1lc3NhZ2Ugd2l0aCBzdWJqZWN0IG9yIGJv ZHkgJ2hlbHAnIHRvDQo+ICAgICAgIHNkbi1yZXF1ZXN0QG1haWwuaWV0Zi5vcmcNCj4NCj5Zb3Ug Y2FuIHJlYWNoIHRoZSBwZXJzb24gbWFuYWdpbmcgdGhlIGxpc3QgYXQNCj4gICAgICAgc2RuLW93 bmVyQG1haWwuaWV0Zi5vcmcNCj4NCj5XaGVuIHJlcGx5aW5nLCBwbGVhc2UgZWRpdCB5b3VyIFN1 YmplY3QgbGluZSBzbyBpdCBpcyBtb3JlIHNwZWNpZmljDQo+dGhhbiAiUmU6IENvbnRlbnRzIG9m IHNkbiBkaWdlc3QuLi4iDQo+DQo+DQo+VG9kYXkncyBUb3BpY3M6DQo+DQo+ICAgMS4gU0ROUkcg YXQgSUVURiA5NCAtIENhbGwgZm9yIFByZXNlbnRhdGlvbnMgKEtpbmcsIERhbmllbCkNCj4NCj4N Cj4tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tDQo+DQo+TWVzc2FnZTogMQ0KPkRhdGU6IFdlZCwgNyBPY3QgMjAxNSAx NTo0Mzo0OCArMDAwMA0KPkZyb206ICJLaW5nLCBEYW5pZWwiIDxkLmtpbmdAbGFuY2FzdGVyLmFj LnVrPg0KPlRvOiAic2RuQGlydGYub3JnIiA8c2RuQGlydGYub3JnPg0KPlN1YmplY3Q6IFtTZG5d IFNETlJHIGF0IElFVEYgOTQgLSBDYWxsIGZvciBQcmVzZW50YXRpb25zDQo+TWVzc2FnZS1JRDoN Cj4gICAgICAgPDY1MTc0NDI5QjVBRjRDNDVCRDA3OTg4MTBFQzQ4RTBBMzI0ODEzRDlARVgtMC1N QjIubGFuY3MubG9jYWw+DQo+Q29udGVudC1UeXBlOiB0ZXh0L3BsYWluOyBjaGFyc2V0PSJ1dGYt OCINCj4NCj5IaSBBbGwsDQo+DQo+DQo+DQo+SUVURiA5NCBpbiBZb2tvaGFtYSwgSmFwYW4uDQo+ DQo+LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4NCj4NCj4NCj5UaGUg U29mdHdhcmUgRGVmaW5lZCBOZXR3b3JraW5nIFJlc2VhcmNoIEdyb3VwIChTRE5SRykgd2lsbCBo b2xkIGl0cyBuZXh0IG1lZXRpbmcgaW4gY29uanVuY3Rpb24gd2l0aCBJRVRGIDk0IG9uIE1vbmRh eSwgTm92ZW1iZXIgMiwgMjAxNSAoSlNUKS4NCj4NCj4NCj4NCj5UaGUgU0ROUkcgUHJvZ3JhbSBD b21taXR0ZWUgaXMgc2Vla2luZyBwcm9wb3NhbHMgZm9yIHByZXNlbnRhdGlvbnMgZm9yIHRoZSBJ UlRGIFNETlJHIGFnZW5kYS4gUHJlc2VudGF0aW9ucyBoaWdobGlnaHRpbmcgY3VycmVudCByZXNl YXJjaCBpbiBTRE4gYW5kIGl0cyBhcHBsaWNhdGlvbnMgYXJlIGVuY291cmFnZWQuIEFyZWFzIG9m IGludGVyZXN0IGluY2x1ZGUgKGJ1dCBhcmUgbm90IGxpbWl0ZWQgdG8pOg0KPg0KPg0KPg0KPm8g Q2xhc3NpZmljYXRpb24gb2YgU0ROIG1vZGVscywgaW5jbHVkaW5nIERlZmluaXRpb25zLCBUYXhv bm9taWVzDQo+DQo+byBTRE4gbW9kZWwgc2NhbGFiaWxpdHkgYW5kIGFwcGxpY2FiaWxpdHkNCj4N Cj5vIFNETiBTZWN1cml0eQ0KPg0KPm8gU0ROIFBvbGljeQ0KPg0KPm8gTXVsdGktbGF5ZXIgcHJv Z3JhbW1hYmlsaXR5IGFuZCBmZWVkYmFjayBjb250cm9sIHN5c3RlbXMNCj4NCj5vIFN5c3RlbSBD b21wbGV4aXR5DQo+DQo+byBOZXR3b3JrIGRlc2NyaXB0aW9uIGxhbmd1YWdlcywgYWJzdHJhY3Rp b25zLCBpbnRlcmZhY2VzIGFuZA0KPg0KPiAgIGNvbXBpbGVycyBpbmNsdWRpbmcgbWV0aG9kcyBh bmQgbWVjaGFuaXNtcyBmb3IgKG9uLWxpbmUpDQo+DQo+ICAgdmVyaWZpY2F0aW9uIG9mIGNvcnJl Y3Qgb3BlcmF0aW9uIG9mIG5ldHdvcmsvbm9kZSBmdW5jdGlvbi4NCj4NCj4gbyBNZXRob2RzIGZv ciBpbmNyZWFzaW5nIHRoZSBkYXRhLWF3YXJlbmVzcyBvZiB0aGUgbmV0d29yaw0KPg0KPg0KPg0K PlBsZWFzZSBzZW5kIHlvdXIgcHJvcG9zYWxzIHRvIGQua2luZ0BsYW5jYXN0ZXIuYWMudWs8bWFp bHRvOmQua2luZ0BsYW5jYXN0ZXIuYWMudWs+Lg0KPg0KPg0KPg0KPkNGUCBEZWFkbGluZSAjMTog UHJlc2VudGF0aW9uIFByb3Bvc2FsIChBYnN0cmFjdHMpIER1ZSBieSBPY3QgMjUuDQo+DQo+Q0ZQ IERlYWRsaW5lICMyOiBQcmVzZW50YXRpb24gU2xpZGVzIER1ZSAxIE5vdi4NCj4NCj4NCj4NCj5C UiwgRGFuLg0KPg0KPg0KPi0tLS0tLS0tLS0tLS0tIG5leHQgcGFydCAtLS0tLS0tLS0tLS0tLQ0K PkFuIEhUTUwgYXR0YWNobWVudCB3YXMgc2NydWJiZWQuLi4NCj5VUkw6IDxodHRwczovL21haWxh cmNoaXZlLmlldGYub3JnL2FyY2gvYnJvd3NlL3Nkbi9hdHRhY2htZW50cy8yMDE1MTAwNy8zNTA4 NTFkZi9hdHRhY2htZW50Lmh0bWw+DQo+DQo+LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t DQo+DQo+U3ViamVjdDogRGlnZXN0IEZvb3Rlcg0KPg0KPl9fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fDQo+c2RuIG1haWxpbmcgbGlzdA0KPnNkbkBtYWlsLmll dGYub3JnDQo+aHR0cHM6Ly9tYWlsLmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vc2RuDQo+DQo+ DQo+LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+DQo+RW5kIG9mIHNkbiBEaWdlc3Qs IFZvbCA0MSwgSXNzdWUgMw0KPioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioNCg0K X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCg0KRXN0ZSBtZW5zYWplIHkgc3VzIGFk anVudG9zIHNlIGRpcmlnZW4gZXhjbHVzaXZhbWVudGUgYSBzdSBkZXN0aW5hdGFyaW8sIHB1ZWRl IGNvbnRlbmVyIGluZm9ybWFjacOzbiBwcml2aWxlZ2lhZGEgbyBjb25maWRlbmNpYWwgeSBlcyBw YXJhIHVzbyBleGNsdXNpdm8gZGUgbGEgcGVyc29uYSBvIGVudGlkYWQgZGUgZGVzdGluby4gU2kg bm8gZXMgdXN0ZWQuIGVsIGRlc3RpbmF0YXJpbyBpbmRpY2FkbywgcXVlZGEgbm90aWZpY2FkbyBk ZSBxdWUgbGEgbGVjdHVyYSwgdXRpbGl6YWNpw7NuLCBkaXZ1bGdhY2nDs24geS9vIGNvcGlhIHNp biBhdXRvcml6YWNpw7NuIHB1ZWRlIGVzdGFyIHByb2hpYmlkYSBlbiB2aXJ0dWQgZGUgbGEgbGVn aXNsYWNpw7NuIHZpZ2VudGUuIFNpIGhhIHJlY2liaWRvIGVzdGUgbWVuc2FqZSBwb3IgZXJyb3Is IGxlIHJvZ2Ftb3MgcXVlIG5vcyBsbyBjb211bmlxdWUgaW5tZWRpYXRhbWVudGUgcG9yIGVzdGEg bWlzbWEgdsOtYSB5IHByb2NlZGEgYSBzdSBkZXN0cnVjY2nDs24uDQoNClRoZSBpbmZvcm1hdGlv biBjb250YWluZWQgaW4gdGhpcyB0cmFuc21pc3Npb24gaXMgcHJpdmlsZWdlZCBhbmQgY29uZmlk ZW50aWFsIGluZm9ybWF0aW9uIGludGVuZGVkIG9ubHkgZm9yIHRoZSB1c2Ugb2YgdGhlIGluZGl2 aWR1YWwgb3IgZW50aXR5IG5hbWVkIGFib3ZlLiBJZiB0aGUgcmVhZGVyIG9mIHRoaXMgbWVzc2Fn ZSBpcyBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgeW91IGFyZSBoZXJlYnkgbm90aWZpZWQg dGhhdCBhbnkgZGlzc2VtaW5hdGlvbiwgZGlzdHJpYnV0aW9uIG9yIGNvcHlpbmcgb2YgdGhpcyBj b21tdW5pY2F0aW9uIGlzIHN0cmljdGx5IHByb2hpYml0ZWQuIElmIHlvdSBoYXZlIHJlY2VpdmVk IHRoaXMgdHJhbnNtaXNzaW9uIGluIGVycm9yLCBkbyBub3QgcmVhZCBpdC4gUGxlYXNlIGltbWVk aWF0ZWx5IHJlcGx5IHRvIHRoZSBzZW5kZXIgdGhhdCB5b3UgaGF2ZSByZWNlaXZlZCB0aGlzIGNv bW11bmljYXRpb24gaW4gZXJyb3IgYW5kIHRoZW4gZGVsZXRlIGl0Lg0KDQpFc3RhIG1lbnNhZ2Vt IGUgc2V1cyBhbmV4b3Mgc2UgZGlyaWdlbSBleGNsdXNpdmFtZW50ZSBhbyBzZXUgZGVzdGluYXTD oXJpbywgcG9kZSBjb250ZXIgaW5mb3JtYcOnw6NvIHByaXZpbGVnaWFkYSBvdSBjb25maWRlbmNp YWwgZSDDqSBwYXJhIHVzbyBleGNsdXNpdm8gZGEgcGVzc29hIG91IGVudGlkYWRlIGRlIGRlc3Rp bm8uIFNlIG7Do28gw6kgdm9zc2Egc2VuaG9yaWEgbyBkZXN0aW5hdMOhcmlvIGluZGljYWRvLCBm aWNhIG5vdGlmaWNhZG8gZGUgcXVlIGEgbGVpdHVyYSwgdXRpbGl6YcOnw6NvLCBkaXZ1bGdhw6fD o28gZS9vdSBjw7NwaWEgc2VtIGF1dG9yaXphw6fDo28gcG9kZSBlc3RhciBwcm9pYmlkYSBlbSB2 aXJ0dWRlIGRhIGxlZ2lzbGHDp8OjbyB2aWdlbnRlLiBTZSByZWNlYmV1IGVzdGEgbWVuc2FnZW0g cG9yIGVycm8sIHJvZ2Ftb3MtbGhlIHF1ZSBub3MgbyBjb211bmlxdWUgaW1lZGlhdGFtZW50ZSBw b3IgZXN0YSBtZXNtYSB2aWEgZSBwcm9jZWRhIGEgc3VhIGRlc3RydWnDp8Ojbw0K From nobody Fri Oct 16 13:56:54 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D84C1AD369 for ; Fri, 16 Oct 2015 13:56:53 -0700 (PDT) X-Quarantine-ID: X-Virus-Scanned: amavisd-new at amsl.com X-Amavis-Alert: BANNED, message contains application/ms-tnef, .tnef, winmail.dat X-Spam-Flag: NO X-Spam-Score: -1.522 X-Spam-Level: X-Spam-Status: No, score=-1.522 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_NEUTRAL=0.779] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tYcyiGSVbYiH for ; Fri, 16 Oct 2015 13:56:50 -0700 (PDT) Received: from ignavia.lancs.ac.uk (ignavia.lancs.ac.uk [148.88.25.16]) by ietfa.amsl.com (Postfix) with ESMTP id 9F5251AD368 for ; Fri, 16 Oct 2015 13:56:50 -0700 (PDT) Received: from ex-0-ht0.lancs.ac.uk ([10.42.18.47] helo=EX-0-HT0.lancs.local) by ignavia.lancs.ac.uk with esmtp (Exim 4.72) (envelope-from ) id 1ZnC3V-00040p-Pd for sdn@irtf.org; Fri, 16 Oct 2015 21:56:49 +0100 Received: from EX-0-MB2.lancs.local ([fe80::9d98:936b:54d1:c531]) by EX-0-HT0.lancs.local ([fe80::7d10:114a:53b0:7f2f%12]) with mapi id 14.03.0248.002; Fri, 16 Oct 2015 21:56:49 +0100 Content-Type: multipart/mixed; boundary="_000_65174429B5AF4C45BD0798810EC48E0A32489A0BEX0MB2lancsloca_" From: "King, Daniel" To: "'sdn@irtf.org'" Thread-Topic: ONF Liaison to IRTF: Publication of ONF TR-518, Relationship of SDN and NFV Thread-Index: AdEIVLHGliEQCCPiR4+K35SHPhi/pw== Date: Fri, 16 Oct 2015 20:56:48 +0000 Message-ID: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> x-originating-ip: [213.205.251.102] x-iss-local-domain: 1 MIME-Version: 1.0 Archived-At: Subject: [Sdn] ONF Liaison to IRTF: Publication of ONF TR-518, Relationship of SDN and NFV X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 16 Oct 2015 20:56:53 -0000 --_000_65174429B5AF4C45BD0798810EC48E0A32489A0BEX0MB2lancsloca_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi SDN Researchers, You may be interested in a recent ONF Liaison regarding a recent ONF public= ation (TR-518 "Relationship of SDN and NFV"). The liaison information and = link to the public document is detailed below. >> Dear colleagues, This is to inform you of the publication of ONF Technical Recommendation TR= -518, entitled Relationship of SDN and NFV. It offers perspectives on ways in which SDN an= d NFV complement and strengthen each other, and especially encourages the avoidance of silos= between SDN and NFV. The released document is available at: https://www.opennetworking.org/image= s/stories/downloads/sdn-resources/technicalreports/onf2015.310_Architectura= l_comparison.08-2.pdf We invite and encourage you to make use of it in your further consideration= of related topics. << BR, Dan. --_000_65174429B5AF4C45BD0798810EC48E0A32489A0BEX0MB2lancsloca_ Content-Disposition: attachment; filename="winmail.dat" Content-Transfer-Encoding: base64 Content-Type: application/ms-tnef; name="winmail.dat" eJ8+IuoLAQaQCAAEAAAAAAABAAEAAQeQBgAIAAAA5AQAAAAAAADoAAEJgAEAIQAAADI3NTcxMTQz MzQwNTc2NEI5MkNGNkNGQjRCMzdDNUFCAB0HAQ2ABAACAAAAAgACAAEFgAMADgAAAN8HCgAQABQA OAAwAAUAgQEBIIADAA4AAADfBwoAEAAUADgAMAAFAIEBAQiABwAYAAAASVBNLk1pY3Jvc29mdCBN YWlsLk5vdGUAMQgBBIABAEwAAABPTkYgTGlhaXNvbiB0byBJUlRGOiBQdWJsaWNhdGlvbiBvZiBP TkYgVFItNTE4LCBSZWxhdGlvbnNoaXAgb2YgU0ROIGFuZCBORlYAHBgBA5AGAIwWAAA7AAAAAgF/ AAEAAABAAAAAPDY1MTc0NDI5QjVBRjRDNDVCRDA3OTg4MTBFQzQ4RTBBMzI0ODlBMEJARVgtMC1N QjIubGFuY3MubG9jYWw+AAIBExABAAAAYQwAADxodG1sIHhtbG5zOnY9InVybjpzY2hlbWFzLW1p Y3Jvc29mdC1jb206dm1sIiB4bWxuczpvPSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmlj ZTpvZmZpY2UiIHhtbG5zOnc9InVybjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOndvcmQi IHhtbG5zOm09Imh0dHA6Ly9zY2hlbWFzLm1pY3Jvc29mdC5jb20vb2ZmaWNlLzIwMDQvMTIvb21t bCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnL1RSL1JFQy1odG1sNDAiPjxoZWFkPjxNRVRBIEhU VFAtRVFVSVY9IkNvbnRlbnQtVHlwZSIgQ09OVEVOVD0idGV4dC9odG1sOyBjaGFyc2V0PXVzLWFz Y2lpIj48bWV0YSBuYW1lPUdlbmVyYXRvciBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmls dGVyZWQgbWVkaXVtKSI+PHN0eWxlPjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250 LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAz IDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1h bCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsN Cglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0K CW1zby1mYXJlYXN0LWxhbmd1YWdlOkVOLVVTO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsN Cgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0 aW9uOnVuZGVybGluZTt9DQphOnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7 bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9yOiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9u OnVuZGVybGluZTt9DQpzcGFuLkVtYWlsU3R5bGUxNw0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25h bC1jb21wb3NlOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOndp bmRvd3RleHQ7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7 DQoJbXNvLWZhcmVhc3QtbGFuZ3VhZ2U6RU4tVVM7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3Np emU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1hcmdpbjo3Mi4wcHQgNzIuMHB0IDcyLjBwdCA3Mi4wcHQ7 fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwh LS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3Bp ZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1s Pg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRh dGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+PC9oZWFkPjxib2R5 IGxhbmc9RU4tR0IgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIiPjxkaXYgY2xhc3M9V29y ZFNlY3Rpb24xPjxwIGNsYXNzPU1zb05vcm1hbD5IaSBTRE4gUmVzZWFyY2hlcnMsPG86cD48L286 cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1z b05vcm1hbD5Zb3UgbWF5IGJlIGludGVyZXN0ZWQgaW4gYSByZWNlbnQgT05GIExpYWlzb24gcmVn YXJkaW5nIGEgcmVjZW50IE9ORiBwdWJsaWNhdGlvbiAoVFItNTE4ICYjODIyMDtSZWxhdGlvbnNo aXAgb2YgU0ROIGFuZCBORlYmIzgyMjE7KS4gJm5ic3A7VGhlIGxpYWlzb24gaW5mb3JtYXRpb24g YW5kIGxpbmsgdG8gdGhlIHB1YmxpYyBkb2N1bWVudCBpcyBkZXRhaWxlZCBiZWxvdy4gPG86cD48 L286cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNz PU1zb05vcm1hbD4mZ3Q7Jmd0OzxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1h bD5EZWFyIGNvbGxlYWd1ZXMsPG86cD48L286cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxvOnA+ Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD5UaGlzIGlzIHRvIGluZm9ybSB5b3Ug b2YgdGhlIHB1YmxpY2F0aW9uIG9mIE9ORiBUZWNobmljYWwgUmVjb21tZW5kYXRpb24gVFItNTE4 LCBlbnRpdGxlZDxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48aT5SZWxhdGlvbnNo aXAgb2YgU0ROIGFuZCBORlY8L2k+LiBJdCBvZmZlcnMgcGVyc3BlY3RpdmVzIG9uIHdheXMgaW4g d2hpY2ggU0ROIGFuZCBORlYgY29tcGxlbWVudDxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05v cm1hbD5hbmQgc3RyZW5ndGhlbiBlYWNoIG90aGVyLCBhbmQgZXNwZWNpYWxseSBlbmNvdXJhZ2Vz IHRoZSBhdm9pZGFuY2Ugb2Ygc2lsb3MgYmV0d2VlbiBTRE4gYW5kPG86cD48L286cD48L3A+PHAg Y2xhc3M9TXNvTm9ybWFsPk5GVi48bzpwPjwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PG86 cD4mbmJzcDs8L286cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPlRoZSByZWxlYXNlZCBkb2N1bWVu dCBpcyBhdmFpbGFibGUgYXQ6IDxhIGhyZWY9Imh0dHBzOi8vd3d3Lm9wZW5uZXR3b3JraW5nLm9y Zy9pbWFnZXMvc3Rvcmllcy9kb3dubG9hZHMvc2RuLXJlc291cmNlcy90ZWNobmljYWxyZXBvcnRz L29uZjIwMTUuMzEwX0FyY2hpdGVjdHVyYWxfY29tcGFyaXNvbi4wOC0yLnBkZiI+aHR0cHM6Ly93 d3cub3Blbm5ldHdvcmtpbmcub3JnL2ltYWdlcy9zdG9yaWVzL2Rvd25sb2Fkcy9zZG4tcmVzb3Vy Y2VzL3RlY2huaWNhbHJlcG9ydHMvb25mMjAxNS4zMTBfQXJjaGl0ZWN0dXJhbF9jb21wYXJpc29u LjA4LTIucGRmPC9hPjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48bzpwPiZuYnNw OzwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+V2UgaW52aXRlIGFuZCBlbmNvdXJhZ2UgeW91 IHRvIG1ha2UgdXNlIG9mIGl0IGluIHlvdXIgZnVydGhlciBjb25zaWRlcmF0aW9uIG9mIHJlbGF0 ZWQgdG9waWNzLjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD4mbHQ7Jmx0OzxvOnA+ Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48bzpwPiZuYnNwOzwvbzpwPjwvcD48 cCBjbGFzcz1Nc29Ob3JtYWw+QlIsIERhbi4gPG86cD48L286cD48L3A+PC9kaXY+PC9ib2R5Pjwv aHRtbD4AAAAfAEIAAQAAABoAAABLAGkAbgBnACwAIABEAGEAbgBpAGUAbAAAAAAAHwBlAAEAAAAu AAAAZAAuAGsAaQBuAGcAQABsAGEAbgBjAGEAcwB0AGUAcgAuAGEAYwAuAHUAawAAAAAAHwBkAAEA AAAKAAAAUwBNAFQAUAAAAAAAAgFBAAEAAABqAAAAAAAAAIErH6S+oxAZnW4A3QEPVAIAAACASwBp AG4AZwAsACAARABhAG4AaQBlAGwAAABTAE0AVABQAAAAZAAuAGsAaQBuAGcAQABsAGEAbgBjAGEA cwB0AGUAcgAuAGEAYwAuAHUAawAAAAAAHwACXQEAAAAuAAAAZAAuAGsAaQBuAGcAQABsAGEAbgBj AGEAcwB0AGUAcgAuAGEAYwAuAHUAawAAAAAAHwDlXwEAAAAEAAAAIAAAAB8AGgwBAAAAGgAAAEsA aQBuAGcALAAgAEQAYQBuAGkAZQBsAAAAAAAfAB8MAQAAAC4AAABkAC4AawBpAG4AZwBAAGwAYQBu AGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAAAAAfAB4MAQAAAAoAAABTAE0AVABQAAAAAAACARkM AQAAAGoAAAAAAAAAgSsfpL6jEBmdbgDdAQ9UAgAAAIBLAGkAbgBnACwAIABEAGEAbgBpAGUAbAAA AFMATQBUAFAAAABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAA AAAfAAFdAQAAAC4AAABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBr AAAAAAAfAPg/AQAAABoAAABLAGkAbgBnACwAIABEAGEAbgBpAGUAbAAAAAAAHwAjQAEAAAAuAAAA ZAAuAGsAaQBuAGcAQABsAGEAbgBjAGEAcwB0AGUAcgAuAGEAYwAuAHUAawAAAAAAHwAiQAEAAAAK AAAAUwBNAFQAUAAAAAAAAgH5PwEAAABqAAAAAAAAAIErH6S+oxAZnW4A3QEPVAIAAACASwBpAG4A ZwAsACAARABhAG4AaQBlAGwAAABTAE0AVABQAAAAZAAuAGsAaQBuAGcAQABsAGEAbgBjAGEAcwB0 AGUAcgAuAGEAYwAuAHUAawAAAAAAHwAJXQEAAAAuAAAAZAAuAGsAaQBuAGcAQABsAGEAbgBjAGEA cwB0AGUAcgAuAGEAYwAuAHUAawAAAAAACwBAOgEAAAAfABoAAQAAABIAAABJAFAATQAuAE4AbwB0 AGUAAAAAAAMA8T8JBAAACwBAOgEAAAADAP0/5AQAAAIBCzABAAAAEAAAACdXEUM0BXZLks9s+0s3 xasDABcAAQAAAEAAOQAAKF0sVQjRAUAACDBzvm4sVQjRAQsAKQAAAAAACwAjAAAAAAAfAACAhgMC AAAAAADAAAAAAAAARgEAAAAeAAAAYQBjAGMAZQBwAHQAbABhAG4AZwB1AGEAZwBlAAAAAAABAAAA GgAAAGUAbgAtAEcAQgAsACAAZQBuAC0AVQBTAAAAAAALAACACCAGAAAAAADAAAAAAAAARgAAAAAG hQAAAAAAAB8ANwABAAAAmAAAAE8ATgBGACAATABpAGEAaQBzAG8AbgAgAHQAbwAgAEkAUgBUAEYA OgAgAFAAdQBiAGwAaQBjAGEAdABpAG8AbgAgAG8AZgAgAE8ATgBGACAAVABSAC0ANQAxADgALAAg AFIAZQBsAGEAdABpAG8AbgBzAGgAaQBwACAAbwBmACAAUwBEAE4AIABhAG4AZAAgAE4ARgBWAAAA HwA9AAEAAAACAAAAAAAAAAMANgAAAAAAAgFxAAEAAAAWAAAAAdEIVLHGliEQCCPiR4+K35SHPhi/ pwAAHwBwAAEAAACYAAAATwBOAEYAIABMAGkAYQBpAHMAbwBuACAAdABvACAASQBSAFQARgA6ACAA UAB1AGIAbABpAGMAYQB0AGkAbwBuACAAbwBmACAATwBOAEYAIABUAFIALQA1ADEAOAAsACAAUgBl AGwAYQB0AGkAbwBuAHMAaABpAHAAIABvAGYAIABTAEQATgAgAGEAbgBkACAATgBGAFYAAAAfADUQ AQAAAIAAAAA8ADYANQAxADcANAA0ADIAOQBCADUAQQBGADQAQwA0ADUAQgBEADAANwA5ADgAOAAx ADAARQBDADQAOABFADAAQQAzADIANAA4ADkAQQAwAEIAQABFAFgALQAwAC0ATQBCADIALgBsAGEA bgBjAHMALgBsAG8AYwBhAGwAPgAAAAMA3j+fTgAACwAAgAggBgAAAAAAwAAAAAAAAEYAAAAAA4UA AAAAAAADAACACCAGAAAAAADAAAAAAAAARgAAAAABhQAAAAAAAAMAgBD/////QAAHMMx4LixVCNEB CwACAAEAAAADACYAAAAAAAIBRwABAAAAOwAAAGM9R0I7YT0gO3A9TGFuY2FzdGVyIFVuaXZlcjts PUVYLTAtTUIyLTE1MTAxNjIwNTY0OFotOTUyMDkAAAIBEDABAAAARgAAAAAAAADkVvWlfM8GQqVN 9k4wQvYvBwAX08HG8KmqTrxoww472Pu6AAAEwPd1AAATLXYPs0SoQ7nIwEKFeuAIADIwRI4RAAAA AB8A+j8BAAAAGgAAAEsAaQBuAGcALAAgAEQAYQBuAGkAZQBsAAAAAAADAAJZAAAWAAMACVkCAAAA AwAAgAggBgAAAAAAwAAAAAAAAEYAAAAAEIUAAAAAAAADAACACCAGAAAAAADAAAAAAAAARgAAAAAY hQAAAAAAAAsAAIAIIAYAAAAAAMAAAAAAAABGAAAAAIKFAAAAAAAACwAAgAggBgAAAAAAwAAAAAAA AEYAAAAADoUAAAAAAABAAACACCAGAAAAAADAAAAAAAAARgAAAAC/hQAA0LNNK1UI0QEDAACACCAG AAAAAADAAAAAAAAARgAAAADrhQAACQgAAAMADTT9PwAAHwAAgIYDAgAAAAAAwAAAAAAAAEYBAAAA IAAAAHgALQBtAHMALQBoAGEAcwAtAGEAdAB0AGEAYwBoAAAAAQAAAAIAAAAAAAAAHwAAgIYDAgAA AAAAwAAAAAAAAEYBAAAAIgAAAHgALQBvAHIAaQBnAGkAbgBhAHQAaQBuAGcALQBpAHAAAAAAAAEA AAAkAAAAWwAyADEAMwAuADIAMAA1AC4AMgA1ADEALgAxADAAMgBdAAAAHwAAgIYDAgAAAAAAwAAA AAAAAEYBAAAAJgAAAHgALQBpAHMAcwAtAGwAbwBjAGEAbAAtAGQAbwBtAGEAaQBuAAAAAAABAAAA BAAAADEAAAAdrw== --_000_65174429B5AF4C45BD0798810EC48E0A32489A0BEX0MB2lancsloca_-- From nobody Fri Oct 16 21:40:58 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 375EE1B3534 for ; Fri, 16 Oct 2015 21:40:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UEOGePU-msa8 for ; Fri, 16 Oct 2015 21:40:54 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0083.outbound.protection.outlook.com [65.55.169.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EDBB51B34CF for ; Fri, 16 Oct 2015 21:40:53 -0700 (PDT) Received: from CY1PR09MB0922.namprd09.prod.outlook.com (10.163.89.140) by CY1PR09MB0921.namprd09.prod.outlook.com (10.163.89.14) with Microsoft SMTP Server (TLS) id 15.1.300.14; Sat, 17 Oct 2015 04:40:50 +0000 Received: from CY1PR09MB0922.namprd09.prod.outlook.com ([10.163.89.140]) by CY1PR09MB0922.namprd09.prod.outlook.com ([10.163.89.140]) with mapi id 15.01.0300.010; Sat, 17 Oct 2015 04:40:50 +0000 From: "Natale, Bob" To: "King, Daniel" Thread-Topic: ONF Liaison to IRTF: Publication of ONF TR-518, Relationship of SDN and NFV Thread-Index: AdEIVLHGliEQCCPiR4+K35SHPhi/pwAQO3kw Date: Sat, 17 Oct 2015 04:40:49 +0000 Message-ID: References: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> In-Reply-To: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=RNATALE@mitre.org; x-originating-ip: [192.80.55.88] x-microsoft-exchange-diagnostics: 1; CY1PR09MB0921; 5:yo3oDBKdDsHP/g+EnHeBa/fz5qWqvpKW5UOuoDV0kfQOmjWRnOpK521UqXpj4/8SbXYYPvk2HeoZgzF5E6H6p8EH/0S+wsgT6pACABi9aGCdtvAtKN6Ltv3gAcJct02zTdcKXfZ1ZU6zsG6mL8twzw==; 24:r1rg7ej7hmg0wWnF1MuMbjsRGY6WIe5wAOEPVTt9SHFk2jWCzepfy8PRUvNsJ9ryRJBmEU3TYRYCGfNcGVcj3dSFIYuxIJlgDoceKCePGck=; 20:LMwWAjkX2tzZlSe1capacZNm0NXn2BCPDIF2GSLZXgA0DwAX65nFXW1hP0EzTQn1kWOvW8/FpTwfJ28T+CaqxQ== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR09MB0921; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(42673675456677)(108003899814671)(83020558694031); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(5005006)(8121501046)(3002001); SRVR:CY1PR09MB0921; BCL:0; PCL:0; RULEID:; SRVR:CY1PR09MB0921; x-forefront-prvs: 07326CFBC4 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(189002)(164054003)(377454003)(199003)(122556002)(11100500001)(92566002)(64706001)(76176999)(5004730100002)(106356001)(19625215002)(74316001)(19580395003)(19580405001)(66066001)(50986999)(102836002)(54356999)(5007970100001)(40100003)(33656002)(2950100001)(15975445007)(101416001)(19300405004)(16236675004)(2900100001)(5002640100001)(10400500002)(105586002)(87936001)(5008740100001)(99286002)(97736004)(81156007)(77096005)(46102003)(5001960100002)(76576001)(189998001)(19617315012)(110136002)(86362001)(5003600100002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR09MB0921; H:CY1PR09MB0922.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_CY1PR09MB09228D4A508935BCC9CDE443A83C0CY1PR09MB0922namp_" MIME-Version: 1.0 X-OriginatorOrg: mitre.org X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2015 04:40:49.7153 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR09MB0921 Archived-At: Cc: "'sdn@irtf.org'" Subject: Re: [Sdn] ONF Liaison to IRTF: Publication of ONF TR-518, Relationship of SDN and NFV X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 17 Oct 2015 04:40:57 -0000 --_000_CY1PR09MB09228D4A508935BCC9CDE443A83C0CY1PR09MB0922namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Dan, The URL in your message did not work for me tonight ... but this one did: https://www.opennetworking.org/images/stories/downloads/sdn-resources/techn= ical-reports/onf2015.310_Architectural_comparison.08-2.pdf ... the difference is the hyphen in the "technical-reports" element. Thanks, BobN From: sdn [mailto:sdn-bounces@irtf.org] On Behalf Of King, Daniel Sent: Friday, October 16, 2015 4:57 PM To: 'sdn@irtf.org' Subject: [Sdn] ONF Liaison to IRTF: Publication of ONF TR-518, Relationship= of SDN and NFV Hi SDN Researchers, You may be interested in a recent ONF Liaison regarding a recent ONF public= ation (TR-518 "Relationship of SDN and NFV"). The liaison information and = link to the public document is detailed below. >> Dear colleagues, This is to inform you of the publication of ONF Technical Recommendation TR= -518, entitled Relationship of SDN and NFV. It offers perspectives on ways in which SDN an= d NFV complement and strengthen each other, and especially encourages the avoidance of silos= between SDN and NFV. The released document is available at: https://www.opennetworking.org/image= s/stories/downloads/sdn-resources/technicalreports/onf2015.310_Architectura= l_comparison.08-2.pdf We invite and encourage you to make use of it in your further consideration= of related topics. << BR, Dan. --_000_CY1PR09MB09228D4A508935BCC9CDE443A83C0CY1PR09MB0922namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Da= n,

=  

The U= RL in your message did not work for me tonight … but this one did:

https://w= ww.opennetworking.org/images/stories/downloads/sdn-resources/technical-repo= rts/onf2015.310_Architectural_comparison.08-2.pdf

=  

̷= 0; the difference is the hyphen in the “technical-reports” elem= ent.

=  

Thank= s,

BobN<= o:p>

=  

From: sdn [mailto:sdn-bounces@irtf.org] On= Behalf Of King, Daniel
Sent: Friday, October 16, 2015 4:57 PM
To: 'sdn@irtf.org' <sdn@irtf.org>
Subject: [Sdn] ONF Liaison to IRTF: Publication of ONF TR-518, Relat= ionship of SDN and NFV

 

Hi SDN Researchers,<= /span>

 

You may be interested in a rece= nt ONF Liaison regarding a recent ONF publication (TR-518 “Relationsh= ip of SDN and NFV”).  The liaison information and link to the pu= blic document is detailed below.

 

>> 

Dear colleagues,

 

This is to inform you of the pu= blication of ONF Technical Recommendation TR-518, entitled

Relationship of SDN and NFV<= /span>. It offers perspectives on ways in which SD= N and NFV complement

and strengthen each other, and = especially encourages the avoidance of silos between SDN and

NFV.

 

The released document is availa= ble at: https://www.opennetworking.org/images/stories/downloads/sdn-resources/techn= icalreports/onf2015.310_Architectural_comparison.08-2.pdf

 

We invite and encourage you to = make use of it in your further consideration of related topics.<= /span>

<< 

 

BR, Dan.

--_000_CY1PR09MB09228D4A508935BCC9CDE443A83C0CY1PR09MB0922namp_-- From nobody Sun Oct 18 08:19:27 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7620B1A8AAC; Sun, 18 Oct 2015 08:19:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.9 X-Spam-Level: X-Spam-Status: No, score=-99.9 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_LOW=-0.7, USER_IN_WHITELIST=-100] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oCmcKtma0dJh; Sun, 18 Oct 2015 08:19:24 -0700 (PDT) Received: from asmtp1.iomartmail.com (asmtp1.iomartmail.com [62.128.201.248]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C5E11A8AAA; Sun, 18 Oct 2015 08:19:23 -0700 (PDT) Received: from asmtp1.iomartmail.com (localhost.localdomain [127.0.0.1]) by asmtp1.iomartmail.com (8.13.8/8.13.8) with ESMTP id t9IFJKKm001840; Sun, 18 Oct 2015 16:19:20 +0100 Received: from 950129200 (79.135.99.37.dsl.gradwelldsl.co.uk [79.135.99.37] (may be forged)) (authenticated bits=0) by asmtp1.iomartmail.com (8.13.8/8.13.8) with ESMTP id t9IFJJSU001834 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Sun, 18 Oct 2015 16:19:20 +0100 From: "Adrian Farrel" To: Date: Sun, 18 Oct 2015 16:19:21 +0100 Message-ID: <006d01d109b8$5dbaf120$1930d360$@olddog.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEJt6+16GzWpCoBQdikkjQmR6Q75g== Content-Language: en-gb X-TM-AS-MML: disable X-TM-AS-Product-Ver: IMSS-7.1.0.1679-8.0.0.1202-21888.001 X-TM-AS-Result: No--2.907-10.0-31-10 X-imss-scan-details: No--2.907-10.0-31-10 X-TMASE-MatchedRID: CuNqLv8MpA0ECY7bP/j9qLheLJw6tpfxnophrTcsI7bfUZT83lbkEJRW 6398OQ0I8kJKPvReuFUPALdO5jTW8VvQ2lxoUSXg4h8r8l3l4eZ9LQinZ4QefL6qvLNjDYTwfyj BJDnutUhQSFbL1bvQASdET58jp62SWQHrLGVYdcczxHHLjrWDBx726YUs0dxnaynJ/QWoZvSrUX oW0b7CcQkCnkA3h/n1D701dfVAizuSL9OvtUca/e6+D482nHhrnqg/VrSZEiM= Archived-At: Cc: sdn@irtf.org Subject: [Sdn] Terminology for Benchmarking SDN Controller Performance X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: adrian@olddog.co.uk List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Oct 2015 15:19:26 -0000 Hi, It surprises me that draft-ietf-bmwg-sdn-controller-benchmark-term makes no reference to RFC 7426 but instead defines its own terminology. Why is that? Thanks, Adrian -- Read my latest... Tales from the Wood - Eighteen new fairy tales http://www.feedaread.com/books/Tales-from-the-Wood-9781786100924.aspx http://www.amazon.co.uk/Tales-Wood-Adrian-Farrel/dp/1786100924 Or buy from me direct. From nobody Sun Oct 18 09:15:54 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A8941A901D for ; Sun, 18 Oct 2015 09:15:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.418 X-Spam-Level: ** X-Spam-Status: No, score=2.418 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_SBL_CSS=3.335, RELAY_IS_203=0.994, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2o3PWa8bUMMg for ; Sun, 18 Oct 2015 09:15:51 -0700 (PDT) Received: from mail.veryxtech.com (mail.veryxtech.com [203.196.171.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8CBE91A900A for ; Sun, 18 Oct 2015 09:15:51 -0700 (PDT) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.veryxtech.com (Postfix) with ESMTP id B3570329DB; Sun, 18 Oct 2015 21:43:02 +0530 (IST) X-Virus-Scanned: amavisd-new at veryxtech.com Received: from mail.veryxtech.com ([127.0.0.1]) by localhost (mail.veryxtech.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uX5kbcY5W-lu; Sun, 18 Oct 2015 21:42:56 +0530 (IST) Received: from LT015 (unknown [45.112.22.98]) by mail.veryxtech.com (Postfix) with ESMTPSA id E175C30E67; Sun, 18 Oct 2015 21:42:55 +0530 (IST) From: "Bhuvan \(Veryx Technologies\)" To: "'MORTON, ALFRED C \(AL\)'" , References: <006d01d109b8$5dbaf120$1930d360$@olddog.co.uk> <4AF73AA205019A4C8A1DDD32C034631D0BB67F953D@NJFPSRVEXG0.research.att.com> In-Reply-To: <4AF73AA205019A4C8A1DDD32C034631D0BB67F953D@NJFPSRVEXG0.research.att.com> Date: Sun, 18 Oct 2015 21:45:42 +0530 Message-ID: <001a01d109c0$3ce2ea90$b6a8bfb0$@veryxtech.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQJ5gtvcp5t4dI953h1MgpbVo1EzHgLD7HAinQpU78A= Content-Language: en-in Archived-At: Cc: sdn@irtf.org, bmwg@ietf.org Subject: Re: [Sdn] [bmwg] Terminology for Benchmarking SDN Controller Performance X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Oct 2015 16:15:53 -0000 Hi Al and Adrian, Sorry that we missed this comment in the last revision. Thanks for bringing this again. We will certainly reference the terms that are already defined and serves the purpose in next revision. Thanks, Bhuvan (Co-Author - Terminology for Benchmarking SDN Controller Performance draft) -----Original Message----- From: bmwg [mailto:bmwg-bounces@ietf.org] On Behalf Of MORTON, ALFRED C (AL) Sent: 18 October 2015 20:57 To: adrian@olddog.co.uk; bmwg@ietf.org Cc: sdn@irtf.org Subject: Re: [bmwg] Terminology for Benchmarking SDN Controller Performance Hi Adrian, thanks for your comment. One of my earlier comments (as co-chair, I believe) was that the terminology needed to be synchronized with RFC 7426 (which had just been published when I made the comment). I see that the authors reproduced the definitions from RFCs, rather than listing them as terms defined elsewhere. "path" from RFC 2330 is another example. So, the first comment is to embrace the existing terminology through references. Then, more of us will be using the same terms, and reviews of this work will be more efficient. regards, Al (as co-chair) > -----Original Message----- > From: bmwg [mailto:bmwg-bounces@ietf.org] On Behalf Of Adrian Farrel > Sent: Sunday, October 18, 2015 11:19 AM > To: bmwg@ietf.org > Cc: sdn@irtf.org > Subject: [bmwg] Terminology for Benchmarking SDN Controller > Performance > > Hi, > > It surprises me that draft-ietf-bmwg-sdn-controller-benchmark-term > makes no reference to RFC 7426 but instead defines its own > terminology. Why is that? > > Thanks, > Adrian > -- > Read my latest... > Tales from the Wood - Eighteen new fairy tales > http://www.feedaread.com/books/Tales-from-the-Wood-9781786100924.aspx > http://www.amazon.co.uk/Tales-Wood-Adrian-Farrel/dp/1786100924 > Or buy from me direct. > > > > _______________________________________________ > bmwg mailing list > bmwg@ietf.org > https://www.ietf.org/mailman/listinfo/bmwg _______________________________________________ bmwg mailing list bmwg@ietf.org https://www.ietf.org/mailman/listinfo/bmwg From nobody Mon Oct 19 13:46:13 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 699041ACD53 for ; Mon, 19 Oct 2015 13:45:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.309 X-Spam-Level: * X-Spam-Status: No, score=1.309 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.886, RAZOR2_CHECK=0.922, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i4-Z3aoNxdvC for ; Mon, 19 Oct 2015 13:45:49 -0700 (PDT) Received: from mail-qg0-x22c.google.com (mail-qg0-x22c.google.com [IPv6:2607:f8b0:400d:c04::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CE6D1ACD44 for ; Mon, 19 Oct 2015 13:45:49 -0700 (PDT) Received: by qgem9 with SMTP id m9so20907113qge.1 for ; Mon, 19 Oct 2015 13:45:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=Xx2W2muzUYvZavsx8SRaqsh54wuq9ZJ34QHNhfNxmVk=; b=cdyv12EbqmnmUl0Jj90kgTDgL0FBM6rUHIWrwDw6HRlCPOkDhnuBE74mA9F9fOyopP WW/yTO6yfL2iS+nKX8nQ0TMAg1bME1TcWbony3KdLd3w8xpYz3md7ThK2DRH1fZgMaZM MmjyiFBCCgDA9PO6XIUwh8Vg2PJPrHwu9nrcsNq/u4br9551WqcRCJsqx3NBYKop1AfY I9LsWNiscfdBHBXHrVKbFB9wx5HExE0fVpMz0lI9KZM8TgqO4yCcHNNUccgIzSVOdmrY 2f6Yto2OUJFw8quV3Fiwh3K2+0dMmHtuaP5SN4oV0y3MdKlVHfUEt2iQwgUmF7kWb79U TsZg== X-Received: by 10.140.145.75 with SMTP id 72mr40723009qhr.81.1445287548383; Mon, 19 Oct 2015 13:45:48 -0700 (PDT) MIME-Version: 1.0 Received: by 10.55.8.135 with HTTP; Mon, 19 Oct 2015 13:45:09 -0700 (PDT) In-Reply-To: <0000926913f1$4d72f98e$67f44c42$@jhome.com> References: <0000926913f1$4d72f98e$67f44c42$@jhome.com> From: srujan Date: Mon, 19 Oct 2015 13:45:09 -0700 Message-ID: To: "pers_iap_survey-bounces@listsmart.osl.state.or.us" Content-Type: multipart/alternative; boundary=001a11356082eb794905227b3a24 Archived-At: Cc: STUART VENTERS , SDN IRTF list , Susan Hares Subject: Re: [Sdn] Fw: new message X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:45:50 -0000 --001a11356082eb794905227b3a24 Content-Type: text/plain; charset=UTF-8 its a spam donot open. srujan On Mon, Oct 19, 2015 at 4:39 AM, pers_iap_survey-bounces@listsmart.osl.state.or.us wrote: > Hello! > > > > *New message, please read* http://cokince.net/while.php > > > > > pers_iap_survey-bounces@listsmart.osl.state.or.us > > _______________________________________________ > sdn mailing list > sdn@irtf.org > https://www.irtf.org/mailman/listinfo/sdn > > --001a11356082eb794905227b3a24 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
its a spam donot open.=C2=A0

sruja= n

On M= on, Oct 19, 2015 at 4:39 AM, pers_iap_survey-bounces@listsmart.osl.state.or.us <= jad@jhome.com> wrote:

_______________________________________________
sdn mailing list
sdn@irtf.org
https://www.irtf.org/mailman/listinfo/sdn


--001a11356082eb794905227b3a24-- From nobody Wed Oct 21 02:15:25 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12ACB1A0266 for ; Wed, 21 Oct 2015 02:15:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.312 X-Spam-Level: X-Spam-Status: No, score=-2.312 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qcUhXPUnAPE8 for ; Wed, 21 Oct 2015 02:15:17 -0700 (PDT) Received: from xenon24.um.es (xenon24.um.es [155.54.212.164]) by ietfa.amsl.com (Postfix) with ESMTP id 92EDF1A0263 for ; Wed, 21 Oct 2015 02:15:17 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon24.um.es (Postfix) with ESMTP id CF922286D; Wed, 21 Oct 2015 11:15:13 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon24.um.es Received: from xenon24.um.es ([127.0.0.1]) by localhost (xenon24.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id aTw3W3sve4ed; Wed, 21 Oct 2015 11:15:13 +0200 (CEST) Received: from inf-205-216.inf.um.es (inf-205-216.inf.um.es [155.54.205.216]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon24.um.es (Postfix) with ESMTPSA id A7DDA288E; Wed, 21 Oct 2015 11:15:10 +0200 (CEST) From: Rafa Marin Lopez Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Date: Wed, 21 Oct 2015 11:15:10 +0200 Message-Id: To: sdn@irtf.org, i2nsf@ietf.org Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) X-Mailer: Apple Mail (2.3094) Archived-At: Cc: Gabriel Lopez , Alejandro Abad UM , Rafa Marin Lopez Subject: [Sdn] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Oct 2015 09:15:23 -0000 Dear all: You may find a new update about Software-Defined Networking (SDN)-based = IPsec Flow Protection in this link: = https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.tx= t We have added some minor modifications and a section to explain the = relationship with I2NSF work. Comments are really welcome. Best Regards. ------------------------------------------------------- Rafael Marin Lopez, PhD Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia 30100 Murcia - Spain Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es ------------------------------------------------------- From nobody Wed Oct 21 15:44:04 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8131B1B3325 for ; Wed, 21 Oct 2015 15:43:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q6IpWAmqGM-o for ; Wed, 21 Oct 2015 15:43:57 -0700 (PDT) Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3176F1B3324 for ; Wed, 21 Oct 2015 15:43:57 -0700 (PDT) Received: from 172.18.9.243 (EHLO dfweml703-chm.china.huawei.com) ([172.18.9.243]) by dfwrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CSD67327; Wed, 21 Oct 2015 17:43:46 -0500 (CDT) Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml703-chm ([10.193.5.130]) with mapi id 14.03.0235.001; Wed, 21 Oct 2015 15:43:41 -0700 From: Linda Dunbar To: Rafa Marin Lopez , "sdn@irtf.org" , "i2nsf@ietf.org" Thread-Topic: [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection Thread-Index: AQHRC+EPdOyopARHkkmGFGA4dOdSzZ52iqFw Date: Wed, 21 Oct 2015 22:43:40 +0000 Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.192.11.236] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: Gabriel Lopez , Alejandro Abad UM Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Oct 2015 22:43:58 -0000 Rafa,=20 Thank you very much for sharing the draft.=20 Can you elaborate what kind of IPSec policies that Apps can give to "SDN Co= ntroller"?=20 I am not an expert on IPSec, so pardon me if my question is not correct: i= f client needs "protected IPsec traffic", can them simply establish two par= allel IPSec tunnels?=20 What is your goal? Only to give use cases for IPSec policy? Or do you plan= to dive in one step further to define the semantics of the polices or rule= s for IPSec? =20 Thanks, Linda=20 -----Original Message----- From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin Lopez Sent: Wednesday, October 21, 2015 4:15 AM To: sdn@irtf.org; i2nsf@ietf.org Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez Subject: [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection Dear all: You may find a new update about Software-Defined Networking (SDN)-based IPs= ec Flow Protection in this link: https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.txt We have added some minor modifications and a section to explain the relatio= nship with I2NSF work. Comments are really welcome. Best Regards. ------------------------------------------------------- Rafael Marin Lopez, PhD Dept. Information and Communications Engineering (DIIC) Faculty of Computer= Science-University of Murcia 30100 Murcia - Spain Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es ------------------------------------------------------- _______________________________________________ I2nsf mailing list I2nsf@ietf.org https://www.ietf.org/mailman/listinfo/i2nsf From nobody Thu Oct 22 01:20:27 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD5C01B2F48 for ; Thu, 22 Oct 2015 01:20:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TpkMXF8gOxAs for ; Thu, 22 Oct 2015 01:20:04 -0700 (PDT) Received: from xenon23.um.es (xenon23.um.es [155.54.212.163]) by ietfa.amsl.com (Postfix) with ESMTP id 139E31B2F43 for ; Thu, 22 Oct 2015 01:20:04 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon23.um.es (Postfix) with ESMTP id 66F97366D; Thu, 22 Oct 2015 10:20:02 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon23.um.es Received: from xenon23.um.es ([127.0.0.1]) by localhost (xenon23.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id xOfPJ+2OvEmf; Thu, 22 Oct 2015 10:20:02 +0200 (CEST) Received: from eduroam_um-7-128.inf.um.es (eduroam_um-7-128.inf.um.es [155.54.7.128]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon23.um.es (Postfix) with ESMTPSA id F14C16E0; Thu, 22 Oct 2015 10:19:58 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Rafa Marin Lopez In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> Date: Thu, 22 Oct 2015 10:19:57 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: <89725C38-5C24-44B2-9957-BAD267993F92@um.es> References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> To: Linda Dunbar X-Mailer: Apple Mail (2.3094) Archived-At: Cc: "i2nsf@ietf.org" , Gabriel Lopez , "sdn@irtf.org" , Alejandro Abad UM , Rafa Marin Lopez Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Oct 2015 08:20:07 -0000 Dear Linda: First of all, thanks for commenting on our draft. > El 22 oct 2015, a las 0:43, Linda Dunbar = escribi=C3=B3: >=20 > Rafa,=20 >=20 > Thank you very much for sharing the draft.=20 >=20 > Can you elaborate what kind of IPSec policies that Apps can give to = "SDN Controller=E2=80=9D?=20 > I am not an expert on IPSec, so pardon me if my question is not = correct: if client needs "protected IPsec traffic", can them simply = establish two parallel IPSec tunnels?=20 Any question is good. So, thank you. Let me try to clarify. When you = want to establish an IPsec protected tunnel you have to configure = rules/policies to determine what kind of traffic you want to protect.=20 Imagine you have* : =20 Network A(172.16.1.0/24) =E2=80=94 GW_A = (192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - (172.16.2.0/24) = Network_B With ipsec-tools in Linux you define the following policies to protect = traffic between both networks with a tunnel. Administrators of both = networks have to configure this in both GW_A and GW_B : spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec esp/tunnel/192.168.1.100-192.168.2.100/require; spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec esp/tunnel/192.168.2.100-192.168.1.100/require; *See the detailed example in Fig. 5 in = http://www.ipsec-howto.org/x304.html Moreover it has to specify other parameters such as credentials to be = used to establish IKE SA, cryptographic algorithms etc=E2=80=A6 >=20 > What is your goal? Only to give use cases for IPSec policy? Our goal is to automatize the management of IPsec security associations = so that administrators do not have add those rules in each device. The = general idea stemmed from the following principle: To establish an IPsec security association you run first IKE to = negotiate the IPsec SA (control plane). Once it is established some = parameters are configured in the kernel of the network devices, so they = can process the IP packets with IPsec before forwarding (data plane). So = for us, there is a clear separation between these two planes. Additionally, please think that IPsec uses packet filtering (and = cryptography). In this sense we consider that a NSF can perform this = task. Thus, some interface as those to be defined in I2NSF may be = required. Btw, you can find a YANG model for ipsec in the following = link: https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00 > Or do you plan to dive in one step further to define the semantics of = the polices or rules for IPSec? =20 If I understand correctly your question I will say the semantics and = rules for IPsec are already there as shown in the example. Another thing = to consider is to define through an application a more general rule such = as =E2=80=9CI want to protect traffic against eavesdropping between = these two networks" that is finally translated in more specific IPsec = policies We hope this clarify your doubts. In any case, if you have any other = question do not hesitate to ask.=20 Best Regards. >=20 > Thanks, Linda=20 >=20 > -----Original Message----- > From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin = Lopez > Sent: Wednesday, October 21, 2015 4:15 AM > To: sdn@irtf.org; i2nsf@ietf.org > Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez > Subject: [I2nsf] New update of = draft-abad-sdnrg-sdn-ipsec-flow-protection >=20 > Dear all: >=20 > You may find a new update about Software-Defined Networking = (SDN)-based IPsec Flow Protection in this link: >=20 > = https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.tx= t >=20 > We have added some minor modifications and a section to explain the = relationship with I2NSF work. >=20 > Comments are really welcome. >=20 > Best Regards. >=20 > ------------------------------------------------------- > Rafael Marin Lopez, PhD > Dept. Information and Communications Engineering (DIIC) Faculty of = Computer Science-University of Murcia > 30100 Murcia - Spain > Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es > ------------------------------------------------------- >=20 >=20 >=20 >=20 > _______________________________________________ > I2nsf mailing list > I2nsf@ietf.org > https://www.ietf.org/mailman/listinfo/i2nsf ------------------------------------------------------- Rafael Marin Lopez, PhD Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia 30100 Murcia - Spain Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es ------------------------------------------------------- From nobody Thu Oct 22 13:07:03 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E61CC1B3F7C for ; Thu, 22 Oct 2015 13:07:01 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bij-x6e4t4vn for ; Thu, 22 Oct 2015 13:06:59 -0700 (PDT) Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3C1A1B3F76 for ; Thu, 22 Oct 2015 13:06:58 -0700 (PDT) Received: from 172.18.9.243 (EHLO dfweml706-chm.china.huawei.com) ([172.18.9.243]) by dfwrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CSE41897; Thu, 22 Oct 2015 15:06:31 -0500 (CDT) Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml706-chm ([10.193.5.225]) with mapi id 14.03.0235.001; Thu, 22 Oct 2015 13:06:25 -0700 From: Linda Dunbar To: Gabriel Lopez , Rafa Marin Lopez Thread-Topic: [I2nsf] [Sdn] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection Thread-Index: AQHRDKQmzKrIC/qIy0W+y47uFrSOGJ537v3A Date: Thu, 22 Oct 2015 20:06:25 +0000 Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> In-Reply-To: <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.192.11.236] Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D7208Adfweml701chm_" MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: "i2nsf@ietf.org" , "sdn@irtf.org" , Alejandro Abad UM Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Oct 2015 20:07:02 -0000 --_000_4A95BA014132FF49AE685FAB4B9F17F657D7208Adfweml701chm_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 UmFmYSBhbmQgR2FiaSwNCg0KVGhhbmsgeW91IHZlcnkgbXVjaCBmb3IgdGhlIGV4cGxhbmF0aW9u LiBUaGF0IGlzIHZlcnkgaGVscGZ1bC4NCg0KQmFzZWQgb24geW91ciBleHBsYW5hdGlvbiwgIHRo ZSBDYXBhYmlsaXR5IExheWVyIGludGVyZmFjZSBmb3IgSVBTZWMgaGFzIGJlZW4gZGVmaW5lZCBi dXQgdGhlcmUgaXMgbmVlZCBmb3IgdGhlIFNlcnZpY2UgTGF5ZXIgcnVsZXMgZm9yIElQU2VjLiBU aGUgc2VydmljZSBsYXllciBJUFNlYyBydWxlcyBjYW4gYmUgYXBwbGllZCB0byBtYW55IHBhaXJz IG9mIElQc2VjIHR1bm5lbHMsIHNvIHRoYXQgYWRtaW5pc3RyYXRvcnMgZG9u4oCZdCBuZWVkIHRv IG1hbnVhbGx5IHNldHVwIGVhY2ggb25lLiBJcyBteSB1bmRlcnN0YW5kaW5nIGNvcnJlY3Q/DQoN CklzIGl0IHRydWUgdGhhdCB0aGUgSUtFIHBvbGljaWVzIGNhbiBiZSB1dGlsaXplZCBiZXR3ZWVu IFNlY3VyaXR5IENvbnRyb2xsZXIgYW5kIENsaWVudCBmb3IgdGhlIFNlcnZpY2UgTGF5ZXIgaW50 ZXJmYWNlPw0KDQpUaGFua3MsIExpbmRhDQoNCkZyb206IEkybnNmIFttYWlsdG86aTJuc2YtYm91 bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIEdhYnJpZWwgTG9wZXoNClNlbnQ6IFRodXJzZGF5 LCBPY3RvYmVyIDIyLCAyMDE1IDM6MzIgQU0NClRvOiBSYWZhIE1hcmluIExvcGV6DQpDYzogaTJu c2ZAaWV0Zi5vcmc7IHNkbkBpcnRmLm9yZzsgQWxlamFuZHJvIEFiYWQgVU07IExpbmRhIER1bmJh cg0KU3ViamVjdDogUmU6IFtJMm5zZl0gW1Nkbl0gTmV3IHVwZGF0ZSBvZiBkcmFmdC1hYmFkLXNk bnJnLXNkbi1pcHNlYy1mbG93LXByb3RlY3Rpb24NCg0KDQpIaSwNCg0KVGhhbmtzIGZvciB0aGUg cmV2aWV3Lg0KDQpQbGVhc2UsIG5vdGUgdGhhdCB0aGUgZHJhZnQgYWxzbyBpbmNsdWRlIElLRSBw b2xpY2llcy4NCg0KQXMgZGVzY3JpYmVkIGluIFJhZmHigJlzIHJlc3BvbnNlLCBJS0UgYWxsb3dz IHR3byBwZWVycyB0byBkeW5hbWljYWxseSBuZWdvdGlhdGUgdGhlIGNyeXB0b2dyYXBoeSBtYXRl cmlhbCBmb3IgSVBTZWMgaW4gYSBzZWN1cmUgd2F5Lg0KQW4gZXhhbXBsZSBvZiBJS0UgcG9saWNp ZXMgY291bGQgYmU6DQoNCmlrZSB7DQogICAgICAgICAgICBwcm9wb3NhbCBwcm9wb3NhbC0xIHsN CiAgICAgICAgICAgICAgICAgICAgICAgIGF1dGhlbnRpY2F0aW9uLW1ldGhvZCBwcmUtc2hhcmVk LWtleXM7DQogICAgICAgICAgICAgICAgICAgICAgICBkaC1ncm91cCBncm91cDE7DQogICAgICAg ICAgICAgICAgICAgICAgICBhdXRoZW50aWNhdGlvbi1hbGdvcml0aG0gc2hhMTsNCiAgICAgICAg ICAgICAgICAgICAgICAgIGVuY3J5cHRpb24tYWxnb3JpdGhtIDNkZXMtY2JjOw0KICAgICAgICAg ICAgICAgICAgICAgICAgbGlmZXRpbWUtc2Vjb25kcyAxMDAwOw0KICAgICAgICAgICAgfQ0KICAg ICAgICAgICAgcHJvcG9zYWwgcHJvcG9zYWwtMiB7DQogICAgICAgICAgICAgICAgICAgICAgICBh dXRoZW50aWNhdGlvbi1tZXRob2QgcHJlLXNoYXJlZC1rZXlzOw0KICAgICAgICAgICAgICAgICAg ICAgICAgZGgtZ3JvdXAgZ3JvdXAyOw0KICAgICAgICAgICAgICAgICAgICAgICAgYXV0aGVudGlj YXRpb24tYWxnb3JpdGhtIG1kNTsNCiAgICAgICAgICAgICAgICAgICAgICAgIGVuY3J5cHRpb24t YWxnb3JpdGhtIGRlcy1jYmM7DQogICAgICAgICAgICAgICAgICAgICAgICBsaWZldGltZS1zZWNv bmRzIDEwMDAwOw0KfQ0KDQpCZXN0IHJlZ2FyZHMsIEdhYmkuDQoNCg0KRWwgMjIgb2N0IDIwMTUs IGEgbGFzIDEwOjE5LCBSYWZhIE1hcmluIExvcGV6IDxyYWZhQHVtLmVzPG1haWx0bzpyYWZhQHVt LmVzPj4gZXNjcmliacOzOg0KDQpEZWFyIExpbmRhOg0KDQpGaXJzdCBvZiBhbGwsIHRoYW5rcyBm b3IgY29tbWVudGluZyBvbiBvdXIgZHJhZnQuDQoNCg0KRWwgMjIgb2N0IDIwMTUsIGEgbGFzIDA6 NDMsIExpbmRhIER1bmJhciA8bGluZGEuZHVuYmFyQGh1YXdlaS5jb208bWFpbHRvOmxpbmRhLmR1 bmJhckBodWF3ZWkuY29tPj4gZXNjcmliacOzOg0KDQpSYWZhLA0KDQpUaGFuayB5b3UgdmVyeSBt dWNoIGZvciBzaGFyaW5nIHRoZSBkcmFmdC4NCg0KQ2FuIHlvdSBlbGFib3JhdGUgd2hhdCBraW5k IG9mIElQU2VjIHBvbGljaWVzIHRoYXQgQXBwcyBjYW4gZ2l2ZSB0byAiU0ROIENvbnRyb2xsZXLi gJ0/DQpJIGFtIG5vdCBhbiBleHBlcnQgb24gSVBTZWMsIHNvIHBhcmRvbiBtZSBpZiBteSBxdWVz dGlvbiBpcyBub3QgY29ycmVjdDogIGlmIGNsaWVudCBuZWVkcyAicHJvdGVjdGVkIElQc2VjIHRy YWZmaWMiLCBjYW4gdGhlbSBzaW1wbHkgZXN0YWJsaXNoIHR3byBwYXJhbGxlbCBJUFNlYyB0dW5u ZWxzPw0KDQpBbnkgcXVlc3Rpb24gaXMgZ29vZC4gU28sIHRoYW5rIHlvdS4gTGV0IG1lIHRyeSB0 byBjbGFyaWZ5LiBXaGVuIHlvdSB3YW50IHRvIGVzdGFibGlzaCBhbiBJUHNlYyBwcm90ZWN0ZWQg dHVubmVsIHlvdSBoYXZlIHRvIGNvbmZpZ3VyZSBydWxlcy9wb2xpY2llcyB0byBkZXRlcm1pbmUg d2hhdCBraW5kIG9mIHRyYWZmaWMgeW91IHdhbnQgdG8gcHJvdGVjdC4NCg0KSW1hZ2luZSB5b3Ug aGF2ZSogOg0KDQpOZXR3b3JrIEEoMTcyLjE2LjEuMC8yNCkg4oCUIEdXX0EgKDE5Mi4xNjguMS4x MDAvMjQpLUludGVybmV0LSgxOTIuMTY4LjIuMTAwLzI0KSBHV19CIC0gKDE3Mi4xNi4yLjAvMjQp IE5ldHdvcmtfQg0KDQpXaXRoIGlwc2VjLXRvb2xzIGluIExpbnV4IHlvdSBkZWZpbmUgdGhlIGZv bGxvd2luZyBwb2xpY2llcyB0byBwcm90ZWN0IHRyYWZmaWMgYmV0d2VlbiBib3RoIG5ldHdvcmtz IHdpdGggYSB0dW5uZWwuIEFkbWluaXN0cmF0b3JzIG9mIGJvdGggbmV0d29ya3MgaGF2ZSB0byBj b25maWd1cmUgdGhpcyBpbiBib3RoIEdXX0EgYW5kIEdXX0IgOg0KDQpzcGRhZGQgMTcyLjE2LjEu MC8yNCAxNzIuMTYuMi4wLzI0IGFueSAtUCBvdXQgaXBzZWMNCiAgICAgICAgICBlc3AvdHVubmVs LzE5Mi4xNjguMS4xMDAtMTkyLjE2OC4yLjEwMC9yZXF1aXJlOw0KDQpzcGRhZGQgMTcyLjE2LjIu MC8yNCAxNzIuMTYuMS4wLzI0IGFueSAtUCBpbiBpcHNlYw0KICAgICAgICAgIGVzcC90dW5uZWwv MTkyLjE2OC4yLjEwMC0xOTIuMTY4LjEuMTAwL3JlcXVpcmU7DQoNCipTZWUgdGhlIGRldGFpbGVk IGV4YW1wbGUgaW4gRmlnLiA1IGluIGh0dHA6Ly93d3cuaXBzZWMtaG93dG8ub3JnL3gzMDQuaHRt bA0KDQpNb3Jlb3ZlciBpdCBoYXMgdG8gc3BlY2lmeSBvdGhlciBwYXJhbWV0ZXJzIHN1Y2ggYXMg Y3JlZGVudGlhbHMgdG8gYmUgdXNlZCB0byBlc3RhYmxpc2ggSUtFIFNBLCBjcnlwdG9ncmFwaGlj IGFsZ29yaXRobXMgZXRj4oCmDQoNCg0KDQpXaGF0IGlzIHlvdXIgZ29hbD8gT25seSB0byBnaXZl IHVzZSBjYXNlcyBmb3IgSVBTZWMgcG9saWN5Pw0KDQpPdXIgZ29hbCBpcyB0byBhdXRvbWF0aXpl IHRoZSBtYW5hZ2VtZW50IG9mIElQc2VjIHNlY3VyaXR5IGFzc29jaWF0aW9ucyBzbyB0aGF0IGFk bWluaXN0cmF0b3JzIGRvIG5vdCBoYXZlIGFkZCB0aG9zZSBydWxlcyBpbiBlYWNoIGRldmljZS4g VGhlIGdlbmVyYWwgaWRlYSBzdGVtbWVkIGZyb20gdGhlIGZvbGxvd2luZyBwcmluY2lwbGU6DQoN ClRvIGVzdGFibGlzaCBhbiBJUHNlYyBzZWN1cml0eSBhc3NvY2lhdGlvbiB5b3UgcnVuIGZpcnN0 IElLRSB0byBuZWdvdGlhdGUgdGhlIElQc2VjIFNBIChjb250cm9sIHBsYW5lKS4gT25jZSBpdCBp cyBlc3RhYmxpc2hlZCBzb21lIHBhcmFtZXRlcnMgYXJlIGNvbmZpZ3VyZWQgaW4gdGhlIGtlcm5l bCBvZiB0aGUgbmV0d29yayBkZXZpY2VzLCBzbyB0aGV5IGNhbiBwcm9jZXNzIHRoZSBJUCBwYWNr ZXRzIHdpdGggSVBzZWMgYmVmb3JlIGZvcndhcmRpbmcgKGRhdGEgcGxhbmUpLiBTbyBmb3IgdXMs IHRoZXJlIGlzIGEgY2xlYXIgc2VwYXJhdGlvbiBiZXR3ZWVuIHRoZXNlIHR3byBwbGFuZXMuDQoN CkFkZGl0aW9uYWxseSwgcGxlYXNlIHRoaW5rIHRoYXQgSVBzZWMgdXNlcyBwYWNrZXQgZmlsdGVy aW5nIChhbmQgY3J5cHRvZ3JhcGh5KS4gSW4gdGhpcyBzZW5zZSB3ZSBjb25zaWRlciB0aGF0IGEg TlNGIGNhbiBwZXJmb3JtIHRoaXMgdGFzay4gVGh1cywgc29tZSBpbnRlcmZhY2UgYXMgdGhvc2Ug dG8gYmUgZGVmaW5lZCBpbiBJMk5TRiBtYXkgYmUgcmVxdWlyZWQuIEJ0dywgeW91IGNhbiBmaW5k IGEgWUFORyBtb2RlbCBmb3IgaXBzZWMgaW4gdGhlIGZvbGxvd2luZyBsaW5rOg0KDQpodHRwczov L3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtdHJhbi1pcGVjbWUteWFuZy1pcHNlYy0wMA0KDQoN Cg0KT3IgZG8geW91IHBsYW4gdG8gZGl2ZSBpbiBvbmUgc3RlcCBmdXJ0aGVyIHRvIGRlZmluZSB0 aGUgc2VtYW50aWNzIG9mIHRoZSBwb2xpY2VzIG9yIHJ1bGVzIGZvciBJUFNlYz8NCg0KSWYgSSB1 bmRlcnN0YW5kIGNvcnJlY3RseSB5b3VyIHF1ZXN0aW9uIEkgd2lsbCBzYXkgdGhlIHNlbWFudGlj cyBhbmQgcnVsZXMgZm9yIElQc2VjIGFyZSBhbHJlYWR5IHRoZXJlIGFzIHNob3duIGluIHRoZSBl eGFtcGxlLiBBbm90aGVyIHRoaW5nIHRvIGNvbnNpZGVyIGlzIHRvIGRlZmluZSB0aHJvdWdoIGFu IGFwcGxpY2F0aW9uIGEgbW9yZSBnZW5lcmFsIHJ1bGUgc3VjaCBhcyDigJxJIHdhbnQgdG8gcHJv dGVjdCB0cmFmZmljIGFnYWluc3QgZWF2ZXNkcm9wcGluZyBiZXR3ZWVuIHRoZXNlIHR3byBuZXR3 b3JrcyIgdGhhdCBpcyBmaW5hbGx5IHRyYW5zbGF0ZWQgaW4gbW9yZSBzcGVjaWZpYyBJUHNlYyBw b2xpY2llcw0KDQpXZSBob3BlIHRoaXMgY2xhcmlmeSB5b3VyIGRvdWJ0cy4gSW4gYW55IGNhc2Us IGlmIHlvdSBoYXZlIGFueSBvdGhlciBxdWVzdGlvbiBkbyBub3QgaGVzaXRhdGUgdG8gYXNrLg0K DQpCZXN0IFJlZ2FyZHMuDQoNCg0KVGhhbmtzLCBMaW5kYQ0KDQotLS0tLU9yaWdpbmFsIE1lc3Nh Z2UtLS0tLQ0KRnJvbTogSTJuc2YgW21haWx0bzppMm5zZi1ib3VuY2VzQGlldGYub3JnXSBPbiBC ZWhhbGYgT2YgUmFmYSBNYXJpbiBMb3Bleg0KU2VudDogV2VkbmVzZGF5LCBPY3RvYmVyIDIxLCAy MDE1IDQ6MTUgQU0NClRvOiBzZG5AaXJ0Zi5vcmc8bWFpbHRvOnNkbkBpcnRmLm9yZz47IGkybnNm QGlldGYub3JnPG1haWx0bzppMm5zZkBpZXRmLm9yZz4NCkNjOiBHYWJyaWVsIExvcGV6OyBBbGVq YW5kcm8gQWJhZCBVTTsgUmFmYSBNYXJpbiBMb3Bleg0KU3ViamVjdDogW0kybnNmXSBOZXcgdXBk YXRlIG9mIGRyYWZ0LWFiYWQtc2Rucmctc2RuLWlwc2VjLWZsb3ctcHJvdGVjdGlvbg0KDQpEZWFy IGFsbDoNCg0KWW91IG1heSBmaW5kIGEgbmV3IHVwZGF0ZSBhYm91dCBTb2Z0d2FyZS1EZWZpbmVk IE5ldHdvcmtpbmcgKFNETiktYmFzZWQgSVBzZWMgRmxvdyBQcm90ZWN0aW9uIGluIHRoaXMgbGlu azoNCg0KaHR0cHM6Ly90b29scy5pZXRmLm9yZy9pZC9kcmFmdC1hYmFkLXNkbnJnLXNkbi1pcHNl Yy1mbG93LXByb3RlY3Rpb24tMDEudHh0DQoNCldlIGhhdmUgYWRkZWQgc29tZSBtaW5vciBtb2Rp ZmljYXRpb25zIGFuZCBhIHNlY3Rpb24gdG8gZXhwbGFpbiB0aGUgcmVsYXRpb25zaGlwIHdpdGgg STJOU0Ygd29yay4NCg0KQ29tbWVudHMgYXJlIHJlYWxseSB3ZWxjb21lLg0KDQpCZXN0IFJlZ2Fy ZHMuDQoNCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0NClJhZmFlbCBNYXJpbiBMb3BleiwgUGhEDQpEZXB0LiBJbmZvcm1hdGlvbiBhbmQgQ29t bXVuaWNhdGlvbnMgRW5naW5lZXJpbmcgKERJSUMpIEZhY3VsdHkgb2YgQ29tcHV0ZXIgU2NpZW5j ZS1Vbml2ZXJzaXR5IG9mIE11cmNpYQ0KMzAxMDAgTXVyY2lhIC0gU3BhaW4NClRlbGY6ICszNDg2 ODg4ODUwMSBGYXg6ICszNDg2ODg4NDE1MSBlLW1haWw6IHJhZmFAdW0uZXM8bWFpbHRvOnJhZmFA dW0uZXM+DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tDQoNCg0KDQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fDQpJMm5zZiBtYWlsaW5nIGxpc3QNCkkybnNmQGlldGYub3JnPG1haWx0bzpJMm5zZkBp ZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vaTJuc2YNCg0K LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0K UmFmYWVsIE1hcmluIExvcGV6LCBQaEQNCkRlcHQuIEluZm9ybWF0aW9uIGFuZCBDb21tdW5pY2F0 aW9ucyBFbmdpbmVlcmluZyAoRElJQykNCkZhY3VsdHkgb2YgQ29tcHV0ZXIgU2NpZW5jZS1Vbml2 ZXJzaXR5IG9mIE11cmNpYQ0KMzAxMDAgTXVyY2lhIC0gU3BhaW4NClRlbGY6ICszNDg2ODg4ODUw MSBGYXg6ICszNDg2ODg4NDE1MSBlLW1haWw6IHJhZmFAdW0uZXM8bWFpbHRvOnJhZmFAdW0uZXM+ DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t DQoNCg0KDQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f DQpzZG4gbWFpbGluZyBsaXN0DQpzZG5AaXJ0Zi5vcmc8bWFpbHRvOnNkbkBpcnRmLm9yZz4NCmh0 dHBzOi8vd3d3LmlydGYub3JnL21haWxtYW4vbGlzdGluZm8vc2RuDQoNCg0KLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCkdhYnJpZWwg TMOzcGV6IE1pbGzDoW4NCkRlcGFydGFtZW50byBkZSBJbmdlbmllcsOtYSBkZSBsYSBJbmZvcm1h Y2nDs24geSBsYXMgQ29tdW5pY2FjaW9uZXMNClVuaXZlcnNpdHkgb2YgTXVyY2lhDQpTcGFpbg0K VGVsOiArMzQgODY4ODg4NTA0DQpGYXg6ICszNCA4Njg4ODQxNTENCmVtYWlsOiBnYWJpbG1AdW0u ZXM8bWFpbHRvOmdhYmlsbUB1bS5lcz4NCg0KDQoNCg== --_000_4A95BA014132FF49AE685FAB4B9F17F657D7208Adfweml701chm_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTIgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 SGVsdmV0aWNhOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZhY2UN Cgl7Zm9udC1mYW1pbHk6U2ltU3VuOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0K QGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQg NSAzIDUgNCA2IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglw YW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5 OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQpAZm9udC1mYWNlDQoJ e2ZvbnQtZmFtaWx5OiJcQFNpbVN1biI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9 DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2 Lk1zb05vcm1hbA0KCXttYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250 LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0K YTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29s b3I6Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5N c29IeXBlcmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVy cGxlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5Nc29BY2V0YXRlLCBsaS5Nc29B Y2V0YXRlLCBkaXYuTXNvQWNldGF0ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0 eWxlLWxpbms6IkJhbGxvb24gVGV4dCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0 b206LjAwMDFwdDsNCglmb250LXNpemU6OC4wcHQ7DQoJZm9udC1mYW1pbHk6IlRhaG9tYSIsInNh bnMtc2VyaWYiO30NCnNwYW4uYXBwbGUtdGFiLXNwYW4NCgl7bXNvLXN0eWxlLW5hbWU6YXBwbGUt dGFiLXNwYW47fQ0Kc3Bhbi5hcHBsZS1jb252ZXJ0ZWQtc3BhY2UNCgl7bXNvLXN0eWxlLW5hbWU6 YXBwbGUtY29udmVydGVkLXNwYWNlO30NCnNwYW4uQmFsbG9vblRleHRDaGFyDQoJe21zby1zdHls ZS1uYW1lOiJCYWxsb29uIFRleHQgQ2hhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1z by1zdHlsZS1saW5rOiJCYWxsb29uIFRleHQiOw0KCWZvbnQtZmFtaWx5OiJUYWhvbWEiLCJzYW5z LXNlcmlmIjt9DQpzcGFuLkVtYWlsU3R5bGUyMQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1y ZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiOw0KCWNvbG9yOiMxRjQ5 N0Q7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9u dC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo4LjVpbiAxMS4waW47 DQoJbWFyZ2luOjEuMGluIDEuMGluIDEuMGluIDEuMGluO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7 cGFnZTpXb3JkU2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4N CjxvOnNoYXBlZGVmYXVsdHMgdjpleHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48 IVtlbmRpZl0tLT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0 PSJlZGl0Ij4NCjxvOmlkbWFwIHY6ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5 b3V0PjwveG1sPjwhW2VuZGlmXS0tPg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iRU4tVVMiIGxpbms9 ImJsdWUiIHZsaW5rPSJwdXJwbGUiPg0KPGRpdiBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdE Ij5SYWZhIGFuZCBHYWJpLA0KPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2Fs aWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5i c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5UaGFuayB5b3UgdmVyeSBtdWNoIGZvciB0aGUg ZXhwbGFuYXRpb24uIFRoYXQgaXMgdmVyeSBoZWxwZnVsLg0KPG86cD48L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9y OiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5CYXNlZCBvbiB5 b3VyIGV4cGxhbmF0aW9uLCAmbmJzcDt0aGUgQ2FwYWJpbGl0eSBMYXllciBpbnRlcmZhY2UgZm9y IElQU2VjIGhhcyBiZWVuIGRlZmluZWQgYnV0IHRoZXJlIGlzIG5lZWQgZm9yIHRoZSBTZXJ2aWNl IExheWVyIHJ1bGVzIGZvciBJUFNlYy4gVGhlIHNlcnZpY2UgbGF5ZXINCiBJUFNlYyBydWxlcyBj YW4gYmUgYXBwbGllZCB0byBtYW55IHBhaXJzIG9mIElQc2VjIHR1bm5lbHMsIHNvIHRoYXQgYWRt aW5pc3RyYXRvcnMgZG9u4oCZdCBuZWVkIHRvIG1hbnVhbGx5IHNldHVwIGVhY2ggb25lLiBJcyBt eSB1bmRlcnN0YW5kaW5nIGNvcnJlY3Q/PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxv OnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1 b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5JcyBpdCB0cnVlIHRoYXQgdGhlIElL RSBwb2xpY2llcyBjYW4gYmUgdXRpbGl6ZWQgYmV0d2VlbiBTZWN1cml0eSBDb250cm9sbGVyIGFu ZCBDbGllbnQgZm9yIHRoZSBTZXJ2aWNlIExheWVyIGludGVyZmFjZT88bzpwPjwvbzpwPjwvc3Bh bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7 Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPlRoYW5r cywgTGluZGENCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpw Pjwvc3Bhbj48L3A+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpz b2xpZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6 JnF1b3Q7VGFob21hJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPkZyb206PC9zcGFuPjwv Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEm cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+IEkybnNmIFttYWlsdG86aTJuc2YtYm91bmNl c0BpZXRmLm9yZ10NCjxiPk9uIEJlaGFsZiBPZiA8L2I+R2FicmllbCBMb3Blejxicj4NCjxiPlNl bnQ6PC9iPiBUaHVyc2RheSwgT2N0b2JlciAyMiwgMjAxNSAzOjMyIEFNPGJyPg0KPGI+VG86PC9i PiBSYWZhIE1hcmluIExvcGV6PGJyPg0KPGI+Q2M6PC9iPiBpMm5zZkBpZXRmLm9yZzsgc2RuQGly dGYub3JnOyBBbGVqYW5kcm8gQWJhZCBVTTsgTGluZGEgRHVuYmFyPGJyPg0KPGI+U3ViamVjdDo8 L2I+IFJlOiBbSTJuc2ZdIFtTZG5dIE5ldyB1cGRhdGUgb2YgZHJhZnQtYWJhZC1zZG5yZy1zZG4t aXBzZWMtZmxvdy1wcm90ZWN0aW9uPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8L2Rp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+SGksPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPlRoYW5rcyBmb3IgdGhlIHJldmlldy48bzpwPjwvbzpwPjwv cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+UGxlYXNlLCBub3RlIHRo YXQgdGhlIGRyYWZ0IGFsc28gaW5jbHVkZSBJS0UgcG9saWNpZXMuPG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkFzIGRlc2NyaWJlZCBpbiBSYWZh 4oCZcyByZXNwb25zZSwgSUtFIGFsbG93cyB0d28gcGVlcnMgdG8gZHluYW1pY2FsbHkgbmVnb3Rp YXRlIHRoZSBjcnlwdG9ncmFwaHkgbWF0ZXJpYWwgZm9yIElQU2VjIGluIGEgc2VjdXJlIHdheS48 bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkFuIGV4 YW1wbGUgb2YgSUtFIHBvbGljaWVzIGNvdWxkIGJlOjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5pa2Ugezxicj4NCjxzcGFuIGNsYXNzPSJhcHBs ZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5wcm9wb3NhbCBwcm9wb3NhbC0xIHs8YnI+DQo8 c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3Nw YW4+YXV0aGVudGljYXRpb24tbWV0aG9kIHByZS1zaGFyZWQta2V5czs8YnI+DQo8c3BhbiBjbGFz cz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3NwYW4+ZGgtZ3Jv dXAgZ3JvdXAxOzxicj4NCjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5hdXRoZW50aWNhdGlvbi1hbGdvcml0aG0gc2hhMTs8YnI+DQo8 c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3Nw YW4+ZW5jcnlwdGlvbi1hbGdvcml0aG0gM2Rlcy1jYmM7PGJyPg0KPHNwYW4gY2xhc3M9ImFwcGxl LXRhYi1zcGFuIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgPC9zcGFuPmxpZmV0aW1lLXNlY29u ZHMgMTAwMDs8YnI+DQo8c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3Nw YW4+fTxicj4NCjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5w cm9wb3NhbCBwcm9wb3NhbC0yIHs8YnI+DQo8c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8L3NwYW4+YXV0aGVudGljYXRpb24tbWV0aG9kIHByZS1z aGFyZWQta2V5czs8YnI+DQo8c3BhbiBjbGFzcz0iYXBwbGUtdGFiLXNwYW4iPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyA8L3NwYW4+ZGgtZ3JvdXAgZ3JvdXAyOzxicj4NCjxzcGFuIGNsYXNzPSJh cHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5hdXRoZW50aWNh dGlvbi1hbGdvcml0aG0gbWQ1Ozxicj4NCjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IDwvc3Bhbj5lbmNyeXB0aW9uLWFsZ29yaXRobSBkZXMtY2Jj Ozxicj4NCjxzcGFuIGNsYXNzPSJhcHBsZS10YWItc3BhbiI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7IDwvc3Bhbj5saWZldGltZS1zZWNvbmRzIDEwMDAwOzxicj4NCn08bzpwPjwvbzpwPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+QmVzdCByZWdhcmRzLCBHYWJp LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86 cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5i c3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0 O21hcmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkVsIDIy IG9jdCAyMDE1LCBhIGxhcyAxMDoxOSwgUmFmYSBNYXJpbiBMb3BleiAmbHQ7PGEgaHJlZj0ibWFp bHRvOnJhZmFAdW0uZXMiPnJhZmFAdW0uZXM8L2E+Jmd0OyBlc2NyaWJpw7M6PG86cD48L286cD48 L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi PkRlYXIgTGluZGE6PGJyPg0KPGJyPg0KRmlyc3Qgb2YgYWxsLCB0aGFua3MgZm9yIGNvbW1lbnRp bmcgb24gb3VyIGRyYWZ0Ljxicj4NCjxiciBzdHlsZT0ib3JwaGFuczogYXV0bzt0ZXh0LWFsaWdu OnN0YXJ0O3dpZG93czogYXV0bzstd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7d29yZC1z cGFjaW5nOjBweCI+DQo8YnI+DQo8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjcuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hl bHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5FbCAyMiBvY3QgMjAxNSwgYSBs YXMgMDo0MywgTGluZGEgRHVuYmFyICZsdDs8YSBocmVmPSJtYWlsdG86bGluZGEuZHVuYmFyQGh1 YXdlaS5jb20iPmxpbmRhLmR1bmJhckBodWF3ZWkuY29tPC9hPiZndDsgZXNjcmliacOzOjxicj4N Cjxicj4NClJhZmEsPHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9z cGFuPjxicj4NCjxicj4NClRoYW5rIHlvdSB2ZXJ5IG11Y2ggZm9yIHNoYXJpbmcgdGhlIGRyYWZ0 LjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnI+DQo8 YnI+DQpDYW4geW91IGVsYWJvcmF0ZSB3aGF0IGtpbmQgb2YgSVBTZWMgcG9saWNpZXMgdGhhdCBB cHBzIGNhbiBnaXZlIHRvICZxdW90O1NETiBDb250cm9sbGVy4oCdPzxzcGFuIGNsYXNzPSJhcHBs ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnI+DQpJIGFtIG5vdCBhbiBleHBlcnQg b24gSVBTZWMsIHNvIHBhcmRvbiBtZSBpZiBteSBxdWVzdGlvbiBpcyBub3QgY29ycmVjdDogJm5i c3A7aWYgY2xpZW50IG5lZWRzICZxdW90O3Byb3RlY3RlZCBJUHNlYyB0cmFmZmljJnF1b3Q7LCBj YW4gdGhlbSBzaW1wbHkgZXN0YWJsaXNoIHR3byBwYXJhbGxlbCBJUFNlYyB0dW5uZWxzPzxzcGFu IGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjcu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1 b3Q7Ij48YnI+DQpBbnkgcXVlc3Rpb24gaXMgZ29vZC4gU28sIHRoYW5rIHlvdS4gTGV0IG1lIHRy eSB0byBjbGFyaWZ5LiBXaGVuIHlvdSB3YW50IHRvIGVzdGFibGlzaCBhbiBJUHNlYyBwcm90ZWN0 ZWQgdHVubmVsIHlvdSBoYXZlIHRvIGNvbmZpZ3VyZSBydWxlcy9wb2xpY2llcyB0byBkZXRlcm1p bmUgd2hhdCBraW5kIG9mIHRyYWZmaWMgeW91IHdhbnQgdG8gcHJvdGVjdC48c3BhbiBjbGFzcz0i YXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyPg0KPGJyPg0KSW1hZ2luZSB5 b3UgaGF2ZSogOiAmbmJzcDs8YnI+DQo8YnI+DQpOZXR3b3JrIEEoMTcyLjE2LjEuMC8yNCkg4oCU IEdXX0EgKDE5Mi4xNjguMS4xMDAvMjQpLUludGVybmV0LSgxOTIuMTY4LjIuMTAwLzI0KSBHV19C IC0gKDE3Mi4xNi4yLjAvMjQpIE5ldHdvcmtfQjxicj4NCjxicj4NCldpdGggaXBzZWMtdG9vbHMg aW4gTGludXggeW91IGRlZmluZSB0aGUgZm9sbG93aW5nIHBvbGljaWVzIHRvIHByb3RlY3QgdHJh ZmZpYyBiZXR3ZWVuIGJvdGggbmV0d29ya3Mgd2l0aCBhIHR1bm5lbC4gQWRtaW5pc3RyYXRvcnMg b2YgYm90aCBuZXR3b3JrcyBoYXZlIHRvIGNvbmZpZ3VyZSB0aGlzIGluIGJvdGggR1dfQSBhbmQg R1dfQiA6PGJyPg0KPGJyPg0Kc3BkYWRkIDE3Mi4xNi4xLjAvMjQgMTcyLjE2LjIuMC8yNCBhbnkg LVAgb3V0IGlwc2VjPGJyPg0KJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7ZXNwL3R1bm5lbC8xOTIuMTY4LjEuMTAwLTE5Mi4xNjguMi4x MDAvcmVxdWlyZTs8YnI+DQo8YnI+DQpzcGRhZGQgMTcyLjE2LjIuMC8yNCAxNzIuMTYuMS4wLzI0 IGFueSAtUCBpbiBpcHNlYzxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwO2VzcC90dW5uZWwvMTkyLjE2OC4yLjEwMC0xOTIuMTY4 LjEuMTAwL3JlcXVpcmU7PGJyPg0KPGJyPg0KKlNlZSB0aGUgZGV0YWlsZWQgZXhhbXBsZSBpbiBG aWcuIDUgaW48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+ PC9zcGFuPjxhIGhyZWY9Imh0dHA6Ly93d3cuaXBzZWMtaG93dG8ub3JnL3gzMDQuaHRtbCI+PHNw YW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVv dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+aHR0cDovL3d3dy5pcHNlYy1ob3d0by5vcmcveDMw NC5odG1sPC9zcGFuPjwvYT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjcuMHB0O2ZvbnQtZmFtaWx5 OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij48YnI+DQo8YnI+ DQpNb3Jlb3ZlciBpdCBoYXMgdG8gc3BlY2lmeSBvdGhlciBwYXJhbWV0ZXJzIHN1Y2ggYXMgY3Jl ZGVudGlhbHMgdG8gYmUgdXNlZCB0byBlc3RhYmxpc2ggSUtFIFNBLCBjcnlwdG9ncmFwaGljIGFs Z29yaXRobXMgZXRj4oCmPGJyPg0KPGJyIHN0eWxlPSJvcnBoYW5zOiBhdXRvO3RleHQtYWxpZ246 c3RhcnQ7d2lkb3dzOiBhdXRvOy13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDt3b3JkLXNw YWNpbmc6MHB4Ij4NCjxicj4NCjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVs dmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxicj4NCldoYXQgaXMgeW91ciBn b2FsPyBPbmx5IHRvIGdpdmUgdXNlIGNhc2VzIGZvciBJUFNlYyBwb2xpY3k/PG86cD48L286cD48 L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3 LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx dW90OyI+PGJyPg0KT3VyIGdvYWwgaXMgdG8gYXV0b21hdGl6ZSB0aGUgbWFuYWdlbWVudCBvZiBJ UHNlYyBzZWN1cml0eSBhc3NvY2lhdGlvbnMgc28gdGhhdCBhZG1pbmlzdHJhdG9ycyBkbyBub3Qg aGF2ZSBhZGQgdGhvc2UgcnVsZXMgaW4gZWFjaCBkZXZpY2UuIFRoZSBnZW5lcmFsIGlkZWEgc3Rl bW1lZCBmcm9tIHRoZSBmb2xsb3dpbmcgcHJpbmNpcGxlOjxicj4NCjxicj4NClRvIGVzdGFibGlz aCBhbiBJUHNlYyBzZWN1cml0eSBhc3NvY2lhdGlvbiB5b3UgcnVuIGZpcnN0IElLRSB0byBuZWdv dGlhdGUgdGhlIElQc2VjIFNBIChjb250cm9sIHBsYW5lKS4gT25jZSBpdCBpcyBlc3RhYmxpc2hl ZCBzb21lIHBhcmFtZXRlcnMgYXJlIGNvbmZpZ3VyZWQgaW4gdGhlIGtlcm5lbCBvZiB0aGUgbmV0 d29yayBkZXZpY2VzLCBzbyB0aGV5IGNhbiBwcm9jZXNzIHRoZSBJUCBwYWNrZXRzIHdpdGggSVBz ZWMgYmVmb3JlIGZvcndhcmRpbmcNCiAoZGF0YSBwbGFuZSkuIFNvIGZvciB1cywgdGhlcmUgaXMg YSBjbGVhciBzZXBhcmF0aW9uIGJldHdlZW4gdGhlc2UgdHdvIHBsYW5lcy48YnI+DQo8YnI+DQpB ZGRpdGlvbmFsbHksIHBsZWFzZSB0aGluayB0aGF0IElQc2VjIHVzZXMgcGFja2V0IGZpbHRlcmlu ZyAoYW5kIGNyeXB0b2dyYXBoeSkuIEluIHRoaXMgc2Vuc2Ugd2UgY29uc2lkZXIgdGhhdCBhIE5T RiBjYW4gcGVyZm9ybSB0aGlzIHRhc2suIFRodXMsIHNvbWUgaW50ZXJmYWNlIGFzIHRob3NlIHRv IGJlIGRlZmluZWQgaW4gSTJOU0YgbWF5IGJlIHJlcXVpcmVkLiBCdHcsIHlvdSBjYW4gZmluZCBh IFlBTkcgbW9kZWwgZm9yIGlwc2VjIGluIHRoZQ0KIGZvbGxvd2luZyBsaW5rOjxicj4NCjxicj4N Cjwvc3Bhbj48YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtdHJhbi1p cGVjbWUteWFuZy1pcHNlYy0wMCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjBwdDtmb250LWZh bWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+aHR0cHM6 Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LXRyYW4taXBlY21lLXlhbmctaXBzZWMtMDA8L3Nw YW4+PC9hPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVs dmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPjxicj4NCjxicj4NCjxiciBzdHls ZT0ib3JwaGFuczogYXV0bzt0ZXh0LWFsaWduOnN0YXJ0O3dpZG93czogYXV0bzstd2Via2l0LXRl eHQtc3Ryb2tlLXdpZHRoOiAwcHg7d29yZC1zcGFjaW5nOjBweCI+DQo8YnI+DQo8L3NwYW4+PG86 cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjcuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlm JnF1b3Q7Ij5PciBkbyB5b3UgcGxhbiB0byBkaXZlIGluIG9uZSBzdGVwIGZ1cnRoZXIgdG8gZGVm aW5lIHRoZSBzZW1hbnRpY3Mgb2YgdGhlIHBvbGljZXMgb3IgcnVsZXMgZm9yIElQU2VjPyAmbmJz cDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjcuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVv dDtzYW5zLXNlcmlmJnF1b3Q7Ij48YnI+DQpJZiBJIHVuZGVyc3RhbmQgY29ycmVjdGx5IHlvdXIg cXVlc3Rpb24gSSB3aWxsIHNheSB0aGUgc2VtYW50aWNzIGFuZCBydWxlcyBmb3IgSVBzZWMgYXJl IGFscmVhZHkgdGhlcmUgYXMgc2hvd24gaW4gdGhlIGV4YW1wbGUuIEFub3RoZXIgdGhpbmcgdG8g Y29uc2lkZXIgaXMgdG8gZGVmaW5lIHRocm91Z2ggYW4gYXBwbGljYXRpb24gYSBtb3JlIGdlbmVy YWwgcnVsZSBzdWNoIGFzIOKAnEkgd2FudCB0byBwcm90ZWN0IHRyYWZmaWMgYWdhaW5zdCBlYXZl c2Ryb3BwaW5nDQogYmV0d2VlbiB0aGVzZSB0d28gbmV0d29ya3MmcXVvdDsgdGhhdCBpcyBmaW5h bGx5IHRyYW5zbGF0ZWQgaW4gbW9yZSBzcGVjaWZpYyBJUHNlYyBwb2xpY2llczxicj4NCjxicj4N CldlIGhvcGUgdGhpcyBjbGFyaWZ5IHlvdXIgZG91YnRzLiBJbiBhbnkgY2FzZSwgaWYgeW91IGhh dmUgYW55IG90aGVyIHF1ZXN0aW9uIGRvIG5vdCBoZXNpdGF0ZSB0byBhc2suPHNwYW4gY2xhc3M9 ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxicj4NCjxicj4NCkJlc3QgUmVn YXJkcy48YnIgc3R5bGU9Im9ycGhhbnM6IGF1dG87dGV4dC1hbGlnbjpzdGFydDt3aWRvd3M6IGF1 dG87LXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4O3dvcmQtc3BhY2luZzowcHgiPg0KPGJy Pg0KPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZTo3LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1 b3Q7c2Fucy1zZXJpZiZxdW90OyI+PGJyPg0KVGhhbmtzLCBMaW5kYTxzcGFuIGNsYXNzPSJhcHBs ZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnI+DQo8YnI+DQotLS0tLU9yaWdpbmFs IE1lc3NhZ2UtLS0tLTxicj4NCkZyb206IEkybnNmIFs8YSBocmVmPSJtYWlsdG86aTJuc2YtYm91 bmNlc0BpZXRmLm9yZyI+bWFpbHRvOmkybnNmLWJvdW5jZXNAaWV0Zi5vcmc8L2E+XSBPbiBCZWhh bGYgT2YgUmFmYSBNYXJpbiBMb3Blejxicj4NClNlbnQ6IFdlZG5lc2RheSwgT2N0b2JlciAyMSwg MjAxNSA0OjE1IEFNPGJyPg0KVG86IDxhIGhyZWY9Im1haWx0bzpzZG5AaXJ0Zi5vcmciPnNkbkBp cnRmLm9yZzwvYT47IDxhIGhyZWY9Im1haWx0bzppMm5zZkBpZXRmLm9yZyI+DQppMm5zZkBpZXRm Lm9yZzwvYT48YnI+DQpDYzogR2FicmllbCBMb3BlejsgQWxlamFuZHJvIEFiYWQgVU07IFJhZmEg TWFyaW4gTG9wZXo8YnI+DQpTdWJqZWN0OiBbSTJuc2ZdIE5ldyB1cGRhdGUgb2YgZHJhZnQtYWJh ZC1zZG5yZy1zZG4taXBzZWMtZmxvdy1wcm90ZWN0aW9uPGJyPg0KPGJyPg0KRGVhciBhbGw6PGJy Pg0KPGJyPg0KWW91IG1heSBmaW5kIGEgbmV3IHVwZGF0ZSBhYm91dCBTb2Z0d2FyZS1EZWZpbmVk IE5ldHdvcmtpbmcgKFNETiktYmFzZWQgSVBzZWMgRmxvdyBQcm90ZWN0aW9uIGluIHRoaXMgbGlu azo8YnI+DQo8YnI+DQo8YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL2lkL2RyYWZ0LWFi YWQtc2Rucmctc2RuLWlwc2VjLWZsb3ctcHJvdGVjdGlvbi0wMS50eHQiPmh0dHBzOi8vdG9vbHMu aWV0Zi5vcmcvaWQvZHJhZnQtYWJhZC1zZG5yZy1zZG4taXBzZWMtZmxvdy1wcm90ZWN0aW9uLTAx LnR4dDwvYT48YnI+DQo8YnI+DQpXZSBoYXZlIGFkZGVkIHNvbWUgbWlub3IgbW9kaWZpY2F0aW9u cyBhbmQgYSBzZWN0aW9uIHRvIGV4cGxhaW4gdGhlIHJlbGF0aW9uc2hpcCB3aXRoIEkyTlNGIHdv cmsuPGJyPg0KPGJyPg0KQ29tbWVudHMgYXJlIHJlYWxseSB3ZWxjb21lLjxicj4NCjxicj4NCkJl c3QgUmVnYXJkcy48YnI+DQo8YnI+DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tPGJyPg0KUmFmYWVsIE1hcmluIExvcGV6LCBQaEQ8YnI+DQpE ZXB0LiBJbmZvcm1hdGlvbiBhbmQgQ29tbXVuaWNhdGlvbnMgRW5naW5lZXJpbmcgKERJSUMpIEZh Y3VsdHkgb2YgQ29tcHV0ZXIgU2NpZW5jZS1Vbml2ZXJzaXR5IG9mIE11cmNpYTxicj4NCjMwMTAw IE11cmNpYSAtIFNwYWluPGJyPg0KVGVsZjogJiM0MzszNDg2ODg4ODUwMSBGYXg6ICYjNDM7MzQ4 Njg4ODQxNTEgZS1tYWlsOiA8YSBocmVmPSJtYWlsdG86cmFmYUB1bS5lcyI+cmFmYUB1bS5lczwv YT48YnI+DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tPGJyPg0KPGJyPg0KPGJyPg0KPGJyPg0KPGJyPg0KX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX188YnI+DQpJMm5zZiBtYWlsaW5nIGxpc3Q8YnI+DQo8 YSBocmVmPSJtYWlsdG86STJuc2ZAaWV0Zi5vcmciPkkybnNmQGlldGYub3JnPC9hPjxicj4NCjxh IGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vaTJuc2YiPmh0dHBz Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vaTJuc2Y8L2E+PG86cD48L286cD48L3Nw YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjBw dDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90 OyI+PGJyPg0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLTxicj4NClJhZmFlbCBNYXJpbiBMb3BleiwgUGhEPGJyPg0KRGVwdC4gSW5mb3JtYXRp b24gYW5kIENvbW11bmljYXRpb25zIEVuZ2luZWVyaW5nIChESUlDKTxicj4NCkZhY3VsdHkgb2Yg Q29tcHV0ZXIgU2NpZW5jZS1Vbml2ZXJzaXR5IG9mIE11cmNpYTxicj4NCjMwMTAwIE11cmNpYSAt IFNwYWluPGJyPg0KVGVsZjogJiM0MzszNDg2ODg4ODUwMSBGYXg6ICYjNDM7MzQ4Njg4ODQxNTEg ZS1tYWlsOjxzcGFuIGNsYXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48 L3NwYW4+PGEgaHJlZj0ibWFpbHRvOnJhZmFAdW0uZXMiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 Ny4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm cXVvdDsiPnJhZmFAdW0uZXM8L3NwYW4+PC9hPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7 Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsi Pjxicj4NCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS08YnI+DQo8YnI+DQo8YnI+DQo8YnI+DQo8YnI+DQpfX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCnNkbiBtYWlsaW5nIGxpc3Q8YnI+DQo8L3Nw YW4+PGEgaHJlZj0ibWFpbHRvOnNkbkBpcnRmLm9yZyI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3 LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx dW90OyI+c2RuQGlydGYub3JnPC9zcGFuPjwvYT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjcuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7 Ij48YnI+DQo8L3NwYW4+PGEgaHJlZj0iaHR0cHM6Ly93d3cuaXJ0Zi5vcmcvbWFpbG1hbi9saXN0 aW5mby9zZG4iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6Ny4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7 SGVsdmV0aWNhJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDsiPmh0dHBzOi8vd3d3LmlydGYu b3JnL21haWxtYW4vbGlzdGluZm8vc2RuPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNw OzwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0 eWxlPSJtYXJnaW4tYm90dG9tOjEyLjBwdCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjBwdDtm b250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztj b2xvcjpibGFjayI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo3LjBwdDtmb250LWZh bWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjpi bGFjayI+LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS08YnI+DQpHYWJyaWVsIEzDs3BleiBNaWxsw6FuPGJyPg0KRGVwYXJ0YW1lbnRvIGRl IEluZ2VuaWVyw61hIGRlIGxhIEluZm9ybWFjacOzbiB5IGxhcyBDb211bmljYWNpb25lczxicj4N ClVuaXZlcnNpdHkgb2YgTXVyY2lhPGJyPg0KU3BhaW48YnI+DQpUZWw6ICYjNDM7MzQgODY4ODg4 NTA0PGJyPg0KRmF4OiAmIzQzOzM0IDg2ODg4NDE1MTxicj4NCmVtYWlsOiZuYnNwOzxhIGhyZWY9 Im1haWx0bzpnYWJpbG1AdW0uZXMiPmdhYmlsbUB1bS5lczwvYT48bzpwPjwvbzpwPjwvc3Bhbj48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjcuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OywmcXVvdDtzYW5z LXNlcmlmJnF1b3Q7O2NvbG9yOmJsYWNrIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8 L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1ib3R0b206 MTIuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_4A95BA014132FF49AE685FAB4B9F17F657D7208Adfweml701chm_-- From nobody Thu Oct 22 14:54:40 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 237FB1ACE37 for ; Thu, 22 Oct 2015 14:54:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fzjp4eiBC_M2 for ; Thu, 22 Oct 2015 14:54:34 -0700 (PDT) Received: from xenon23.um.es (xenon23.um.es [155.54.212.163]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA001ACE30 for ; Thu, 22 Oct 2015 14:54:34 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon23.um.es (Postfix) with ESMTP id 0A56270A2; Thu, 22 Oct 2015 23:54:33 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon23.um.es Received: from xenon23.um.es ([127.0.0.1]) by localhost (xenon23.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id BOxkUwGoSI4l; Thu, 22 Oct 2015 23:54:22 +0200 (CEST) Received: from [192.168.1.40] (67.Red-88-23-6.staticIP.rima-tde.net [88.23.6.67]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon23.um.es (Postfix) with ESMTPSA id 6C8817088; Thu, 22 Oct 2015 23:54:18 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Rafa Marin Lopez In-Reply-To: <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> Date: Thu, 22 Oct 2015 23:54:17 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> To: Linda Dunbar X-Mailer: Apple Mail (2.3094) Archived-At: Cc: "i2nsf@ietf.org" , Gabriel Lopez , "sdn@irtf.org" , Alejandro Abad UM , Rafa Marin Lopez Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Oct 2015 21:54:38 -0000 Hi Linda: > El 22 oct 2015, a las 22:06, Linda Dunbar = escribi=C3=B3: >=20 > Rafa and Gabi, > =20 > Thank you very much for the explanation. That is very helpful. > =20 > Based on your explanation, the Capability Layer interface for IPSec = has been defined If you are referring to the YANG model with IPsec then we have a good = step with draft-wang-ipsecme-ipsec-yang > but there is need for the Service Layer rules for IPSec. The service = layer IPSec rules can be applied to many pairs of IPsec tunnels, so that = administrators don=E2=80=99t need to manually setup each one. Is my = understanding correct? Right, that is also our understanding.=20 > =20 > Is it true that the IKE policies can be utilized between Security = Controller and Client for the Service Layer interface? Yes, that might be a possibility, though we understand a deeper analysis = is required. Best Regards. > =20 > Thanks, Linda > =20 > From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Gabriel Lopez > Sent: Thursday, October 22, 2015 3:32 AM > To: Rafa Marin Lopez > Cc: i2nsf@ietf.org; sdn@irtf.org; Alejandro Abad UM; Linda Dunbar > Subject: Re: [I2nsf] [Sdn] New update of = draft-abad-sdnrg-sdn-ipsec-flow-protection > =20 > =20 > Hi, > =20 > Thanks for the review. > =20 > Please, note that the draft also include IKE policies. > =20 > As described in Rafa=E2=80=99s response, IKE allows two peers to = dynamically negotiate the cryptography material for IPSec in a secure = way. > An example of IKE policies could be: > =20 > ike { > proposal proposal-1 { > authentication-method pre-shared-keys; > dh-group group1; > authentication-algorithm sha1; > encryption-algorithm 3des-cbc; > lifetime-seconds 1000; > } > proposal proposal-2 { > authentication-method pre-shared-keys; > dh-group group2; > authentication-algorithm md5; > encryption-algorithm des-cbc; > lifetime-seconds 10000; > } > =20 > Best regards, Gabi. > =20 > =20 > El 22 oct 2015, a las 10:19, Rafa Marin Lopez escribi=C3=B3= : > =20 > Dear Linda: >=20 > First of all, thanks for commenting on our draft. >=20 >=20 > El 22 oct 2015, a las 0:43, Linda Dunbar = escribi=C3=B3: >=20 > Rafa,=20 >=20 > Thank you very much for sharing the draft.=20 >=20 > Can you elaborate what kind of IPSec policies that Apps can give to = "SDN Controller=E2=80=9D?=20 > I am not an expert on IPSec, so pardon me if my question is not = correct: if client needs "protected IPsec traffic", can them simply = establish two parallel IPSec tunnels?=20 >=20 > Any question is good. So, thank you. Let me try to clarify. When you = want to establish an IPsec protected tunnel you have to configure = rules/policies to determine what kind of traffic you want to protect.=20 >=20 > Imagine you have* : =20 >=20 > Network A(172.16.1.0/24) =E2=80=94 GW_A = (192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - (172.16.2.0/24) = Network_B >=20 > With ipsec-tools in Linux you define the following policies to protect = traffic between both networks with a tunnel. Administrators of both = networks have to configure this in both GW_A and GW_B : >=20 > spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec > esp/tunnel/192.168.1.100-192.168.2.100/require; >=20 > spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec > esp/tunnel/192.168.2.100-192.168.1.100/require; >=20 > *See the detailed example in Fig. 5 in = http://www.ipsec-howto.org/x304.html >=20 > Moreover it has to specify other parameters such as credentials to be = used to establish IKE SA, cryptographic algorithms etc=E2=80=A6 >=20 >=20 >=20 > What is your goal? Only to give use cases for IPSec policy? >=20 > Our goal is to automatize the management of IPsec security = associations so that administrators do not have add those rules in each = device. The general idea stemmed from the following principle: >=20 > To establish an IPsec security association you run first IKE to = negotiate the IPsec SA (control plane). Once it is established some = parameters are configured in the kernel of the network devices, so they = can process the IP packets with IPsec before forwarding (data plane). So = for us, there is a clear separation between these two planes. >=20 > Additionally, please think that IPsec uses packet filtering (and = cryptography). In this sense we consider that a NSF can perform this = task. Thus, some interface as those to be defined in I2NSF may be = required. Btw, you can find a YANG model for ipsec in the following = link: >=20 > https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00 >=20 >=20 >=20 > Or do you plan to dive in one step further to define the semantics of = the polices or rules for IPSec? =20 >=20 > If I understand correctly your question I will say the semantics and = rules for IPsec are already there as shown in the example. Another thing = to consider is to define through an application a more general rule such = as =E2=80=9CI want to protect traffic against eavesdropping between = these two networks" that is finally translated in more specific IPsec = policies >=20 > We hope this clarify your doubts. In any case, if you have any other = question do not hesitate to ask.=20 >=20 > Best Regards. >=20 >=20 > Thanks, Linda=20 >=20 > -----Original Message----- > From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin = Lopez > Sent: Wednesday, October 21, 2015 4:15 AM > To: sdn@irtf.org; i2nsf@ietf.org > Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez > Subject: [I2nsf] New update of = draft-abad-sdnrg-sdn-ipsec-flow-protection >=20 > Dear all: >=20 > You may find a new update about Software-Defined Networking = (SDN)-based IPsec Flow Protection in this link: >=20 > = https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.tx= t >=20 > We have added some minor modifications and a section to explain the = relationship with I2NSF work. >=20 > Comments are really welcome. >=20 > Best Regards. >=20 > ------------------------------------------------------- > Rafael Marin Lopez, PhD > Dept. Information and Communications Engineering (DIIC) Faculty of = Computer Science-University of Murcia > 30100 Murcia - Spain > Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es > ------------------------------------------------------- >=20 >=20 >=20 >=20 > _______________________________________________ > I2nsf mailing list > I2nsf@ietf.org > https://www.ietf.org/mailman/listinfo/i2nsf >=20 > ------------------------------------------------------- > Rafael Marin Lopez, PhD > Dept. Information and Communications Engineering (DIIC) > Faculty of Computer Science-University of Murcia > 30100 Murcia - Spain > Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es > ------------------------------------------------------- >=20 >=20 >=20 >=20 > _______________________________________________ > sdn mailing list > sdn@irtf.org > https://www.irtf.org/mailman/listinfo/sdn > =20 > =20 >=20 > ----------------------------------------------------------- > Gabriel L=C3=B3pez Mill=C3=A1n > Departamento de Ingenier=C3=ADa de la Informaci=C3=B3n y las = Comunicaciones > University of Murcia > Spain > Tel: +34 868888504 > Fax: +34 868884151 > email: gabilm@um.es ------------------------------------------------------- Rafael Marin Lopez, PhD Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia 30100 Murcia - Spain Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es ------------------------------------------------------- From nobody Fri Oct 23 02:58:07 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36EBF1B33F7 for ; Fri, 23 Oct 2015 02:58:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.76 X-Spam-Level: X-Spam-Status: No, score=-1.76 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sS5udFRKb2Pw for ; Fri, 23 Oct 2015 02:58:01 -0700 (PDT) Received: from xenon21.um.es (xenon21.um.es [155.54.212.161]) by ietfa.amsl.com (Postfix) with ESMTP id 16ECA1B33BF for ; Fri, 23 Oct 2015 02:58:01 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon21.um.es (Postfix) with ESMTP id 0310A40521; Fri, 23 Oct 2015 11:58:00 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon21.um.es Received: from xenon21.um.es ([127.0.0.1]) by localhost (xenon21.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 4sWI0IUYCELV; Fri, 23 Oct 2015 11:57:59 +0200 (CEST) Received: from eduroam_um-7-160.inf.um.es (eduroam_um-7-160.inf.um.es [155.54.7.160]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: gabilm) by xenon21.um.es (Postfix) with ESMTPSA id CA7073FD54; Fri, 23 Oct 2015 11:57:53 +0200 (CEST) Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) Content-Type: multipart/signed; boundary="Apple-Mail=_F67A2683-9731-4F49-99F1-D6BB0C65A83D"; protocol="application/pgp-signature"; micalg=pgp-sha256 X-Pgp-Agent: GPGMail 2.6b2 From: Gabriel Lopez In-Reply-To: Date: Fri, 23 Oct 2015 11:57:51 +0200 Message-Id: References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> To: Dacheng Zhang X-Mailer: Apple Mail (2.3094) Archived-At: Cc: Sam Hartman , "sdn@irtf.org" , Alejandro Abad UM , "i2nsf@ietf.org" , Linda Dunbar , Rafa Marin Lopez , Mahesh Jethanandani Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 09:58:06 -0000 --Apple-Mail=_F67A2683-9731-4F49-99F1-D6BB0C65A83D Content-Type: multipart/alternative; boundary="Apple-Mail=_7342DEE8-2477-451F-8B0A-0A018D495361" --Apple-Mail=_7342DEE8-2477-451F-8B0A-0A018D495361 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=gb2312 Hi Dacheng, > El 23 oct 2015, a las 4:20, Dacheng Zhang = escribi=A8=AE: >=20 > Hi, >=20 > Maybe this work is not really considered in the current agenda. But I > think it is very interesting. Also, I am thinking whether the similar = idea > can be used to mange the policies of securing routing protocols. I=A1=AFm not an expert on security routing protocols, but I think the = idea es basically the same: to provide key material to the peers = (router, ipsec peer, etc.). > We used > to specify a key table specification for different routing protocols. = At > that time, someone mentioned it could be a good idea to use = controllers to > deploy keys for routing protocols, so that we don=A1=AFt have to = extend IKEv2 > to negotiate them. >=20 > Thoughts? It would depend on how routers trust each other. In our example, an = IPSec peer could be provisioned with cryptographic keys from the = controller (in the case peers belong to the same domain) or they could = make use of IKE to dynamically negotiate these keys. Best regards, Gabi. >=20 > Cheers >=20 > Dacheng >=20 > =D4=DA 15-10-23 =C9=CF=CE=E75:54=A3=AC "I2nsf on behalf of Rafa Marin = Lopez" > =D0=B4=C8=EB: >=20 >> Hi Linda: >>=20 >>> El 22 oct 2015, a las 22:06, Linda Dunbar >>> escribi=A8=AE: >>>=20 >>> Rafa and Gabi, >>>=20 >>> Thank you very much for the explanation. That is very helpful. >>>=20 >>> Based on your explanation, the Capability Layer interface for IPSec >>> has been defined >>=20 >> If you are referring to the YANG model with IPsec then we have a good >> step with draft-wang-ipsecme-ipsec-yang >>=20 >>> but there is need for the Service Layer rules for IPSec. The service >>> layer IPSec rules can be applied to many pairs of IPsec tunnels, so = that >>> administrators don=A1=AFt need to manually setup each one. Is my >>> understanding correct? >>=20 >> Right, that is also our understanding. >>=20 >>>=20 >>> Is it true that the IKE policies can be utilized between Security >>> Controller and Client for the Service Layer interface? >>=20 >> Yes, that might be a possibility, though we understand a deeper = analysis >> is required. >>=20 >> Best Regards. >>=20 >>>=20 >>> Thanks, Linda >>>=20 >>> From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Gabriel = Lopez >>> Sent: Thursday, October 22, 2015 3:32 AM >>> To: Rafa Marin Lopez >>> Cc: i2nsf@ietf.org; sdn@irtf.org; Alejandro Abad UM; Linda Dunbar >>> Subject: Re: [I2nsf] [Sdn] New update of >>> draft-abad-sdnrg-sdn-ipsec-flow-protection >>>=20 >>>=20 >>> Hi, >>>=20 >>> Thanks for the review. >>>=20 >>> Please, note that the draft also include IKE policies. >>>=20 >>> As described in Rafa=A1=AFs response, IKE allows two peers to = dynamically >>> negotiate the cryptography material for IPSec in a secure way. >>> An example of IKE policies could be: >>>=20 >>> ike { >>> proposal proposal-1 { >>> authentication-method pre-shared-keys; >>> dh-group group1; >>> authentication-algorithm sha1; >>> encryption-algorithm 3des-cbc; >>> lifetime-seconds 1000; >>> } >>> proposal proposal-2 { >>> authentication-method pre-shared-keys; >>> dh-group group2; >>> authentication-algorithm md5; >>> encryption-algorithm des-cbc; >>> lifetime-seconds 10000; >>> } >>>=20 >>> Best regards, Gabi. >>>=20 >>>=20 >>> El 22 oct 2015, a las 10:19, Rafa Marin Lopez = escribi=A8=AE: >>>=20 >>> Dear Linda: >>>=20 >>> First of all, thanks for commenting on our draft. >>>=20 >>>=20 >>> El 22 oct 2015, a las 0:43, Linda Dunbar >>> escribi=A8=AE: >>>=20 >>> Rafa, >>>=20 >>> Thank you very much for sharing the draft. >>>=20 >>> Can you elaborate what kind of IPSec policies that Apps can give to >>> "SDN Controller=A1=B1? >>> I am not an expert on IPSec, so pardon me if my question is not >>> correct: if client needs "protected IPsec traffic", can them simply >>> establish two parallel IPSec tunnels? >>>=20 >>> Any question is good. So, thank you. Let me try to clarify. When you >>> want to establish an IPsec protected tunnel you have to configure >>> rules/policies to determine what kind of traffic you want to = protect. >>>=20 >>> Imagine you have* : >>>=20 >>> Network A(172.16.1.0/24) =A1=AA GW_A >>> (192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - = (172.16.2.0/24) >>> Network_B >>>=20 >>> With ipsec-tools in Linux you define the following policies to = protect >>> traffic between both networks with a tunnel. Administrators of both >>> networks have to configure this in both GW_A and GW_B : >>>=20 >>> spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec >>> esp/tunnel/192.168.1.100-192.168.2.100/require; >>>=20 >>> spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec >>> esp/tunnel/192.168.2.100-192.168.1.100/require; >>>=20 >>> *See the detailed example in Fig. 5 in >>> http://www.ipsec-howto.org/x304.html >>>=20 >>> Moreover it has to specify other parameters such as credentials to = be >>> used to establish IKE SA, cryptographic algorithms etc=A1=AD >>>=20 >>>=20 >>>=20 >>> What is your goal? Only to give use cases for IPSec policy? >>>=20 >>> Our goal is to automatize the management of IPsec security = associations >>> so that administrators do not have add those rules in each device. = The >>> general idea stemmed from the following principle: >>>=20 >>> To establish an IPsec security association you run first IKE to >>> negotiate the IPsec SA (control plane). Once it is established some >>> parameters are configured in the kernel of the network devices, so = they >>> can process the IP packets with IPsec before forwarding (data = plane). So >>> for us, there is a clear separation between these two planes. >>>=20 >>> Additionally, please think that IPsec uses packet filtering (and >>> cryptography). In this sense we consider that a NSF can perform this >>> task. Thus, some interface as those to be defined in I2NSF may be >>> required. Btw, you can find a YANG model for ipsec in the following = link: >>>=20 >>> https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00 >>>=20 >>>=20 >>>=20 >>> Or do you plan to dive in one step further to define the semantics = of >>> the polices or rules for IPSec? >>>=20 >>> If I understand correctly your question I will say the semantics and >>> rules for IPsec are already there as shown in the example. Another = thing >>> to consider is to define through an application a more general rule = such >>> as =A1=B0I want to protect traffic against eavesdropping between = these two >>> networks" that is finally translated in more specific IPsec policies >>>=20 >>> We hope this clarify your doubts. In any case, if you have any other >>> question do not hesitate to ask. >>>=20 >>> Best Regards. >>>=20 >>>=20 >>> Thanks, Linda >>>=20 >>> -----Original Message----- >>> From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin >>> Lopez >>> Sent: Wednesday, October 21, 2015 4:15 AM >>> To: sdn@irtf.org; i2nsf@ietf.org >>> Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez >>> Subject: [I2nsf] New update of >>> draft-abad-sdnrg-sdn-ipsec-flow-protection >>>=20 >>> Dear all: >>>=20 >>> You may find a new update about Software-Defined Networking = (SDN)-based >>> IPsec Flow Protection in this link: >>>=20 >>>=20 >>> = https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.t >>> xt >>>=20 >>> We have added some minor modifications and a section to explain the >>> relationship with I2NSF work. >>>=20 >>> Comments are really welcome. >>>=20 >>> Best Regards. >>>=20 >>> ------------------------------------------------------- >>> Rafael Marin Lopez, PhD >>> Dept. Information and Communications Engineering (DIIC) Faculty of >>> Computer Science-University of Murcia >>> 30100 Murcia - Spain >>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >>> ------------------------------------------------------- >>>=20 >>>=20 >>>=20 >>>=20 >>> _______________________________________________ >>> I2nsf mailing list >>> I2nsf@ietf.org >>> https://www.ietf.org/mailman/listinfo/i2nsf >>>=20 >>> ------------------------------------------------------- >>> Rafael Marin Lopez, PhD >>> Dept. Information and Communications Engineering (DIIC) >>> Faculty of Computer Science-University of Murcia >>> 30100 Murcia - Spain >>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >>> ------------------------------------------------------- >>>=20 >>>=20 >>>=20 >>>=20 >>> _______________________________________________ >>> sdn mailing list >>> sdn@irtf.org >>> https://www.irtf.org/mailman/listinfo/sdn >>>=20 >>>=20 >>>=20 >>> ----------------------------------------------------------- >>> Gabriel L=A8=AEpez Mill=A8=A2n >>> Departamento de Ingenier=A8=AAa de la Informaci=A8=AEn y las = Comunicaciones >>> University of Murcia >>> Spain >>> Tel: +34 868888504 >>> Fax: +34 868884151 >>> email: gabilm@um.es >>=20 >> ------------------------------------------------------- >> Rafael Marin Lopez, PhD >> Dept. Information and Communications Engineering (DIIC) >> Faculty of Computer Science-University of Murcia >> 30100 Murcia - Spain >> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >> ------------------------------------------------------- >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> I2nsf mailing list >> I2nsf@ietf.org >> https://www.ietf.org/mailman/listinfo/i2nsf >=20 >=20 ----------------------------------------------------------- Gabriel L=A8=AEpez Mill=A8=A2n Departamento de Ingenier=A8=AAa de la Informaci=A8=AEn y las = Comunicaciones University of Murcia Spain Tel: +34 868888504 Fax: +34 868884151 email: gabilm@um.es --Apple-Mail=_7342DEE8-2477-451F-8B0A-0A018D495361 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=gb2312
Hi Dacheng,


El 23 oct 2015, a las 4:20, Dacheng Zhang = <dacheng.zdc@alibaba-inc.com> escribi=A8=AE:

Hi, =

Maybe this work is not really considered = in the current agenda. But I
think it is very interesting. = Also, I am thinking whether the similar idea
can be used = to mange the policies of securing routing protocols. =

I=A1=AFm not an = expert on security routing protocols, but I think the idea es basically = the same: to provide key material to the peers (router,  ipsec = peer, etc.). 

We used
to = specify a key table specification for different routing protocols. At
that time, someone mentioned it could be a good idea to use = controllers to
deploy keys for routing protocols, so that = we don=A1=AFt have to extend IKEv2
to negotiate them.



Thoughts?

It= would depend on how routers trust each other. In our example, an IPSec = peer could be provisioned with cryptographic keys from the controller = (in the case peers belong to the same domain) or they could make use of = IKE to dynamically negotiate these keys.

Best regards, Gabi.


Cheers

Dacheng

=D4=DA 15-10-23 =C9=CF=CE=E75:54=A3=AC "I2nsf = on behalf of Rafa Marin Lopez"
<i2nsf-bounces@ietf.org on behalf of rafa@um.es> =D0=B4=C8=EB:

Hi = Linda:

El 22 oct 2015, a las 22:06, Linda Dunbar <linda.dunbar@huawei.com>
escribi=A8=AE:
Rafa and Gabi,

Thank you very much for the explanation. That is very = helpful.

Based on your explanation, =  the Capability Layer interface for IPSec
has been = defined

If you are referring = to the YANG model with IPsec then we have a good
step with = draft-wang-ipsecme-ipsec-yang

but there is need for the Service Layer rules = for IPSec. The service
layer IPSec rules can be applied to = many pairs of IPsec tunnels, so that
administrators don=A1=AF= t need to manually setup each one. Is my
understanding = correct?

Right, that is also = our understanding.


Is it true that the IKE policies can be = utilized between Security
Controller and Client for the = Service Layer interface?

Yes, = that might be a possibility, though we understand a deeper analysis
is required.

Best Regards.


Thanks, Linda

From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Gabriel = Lopez
Sent: Thursday, October 22, 2015 3:32 AM
To: Rafa Marin Lopez
Cc: i2nsf@ietf.org; sdn@irtf.org; Alejandro Abad = UM; Linda Dunbar
Subject: Re: [I2nsf] [Sdn] New update = of
draft-abad-sdnrg-sdn-ipsec-flow-protection


Hi,

Thanks for the review.

Please, = note that the draft also include IKE policies.

As described in Rafa=A1=AFs response, IKE allows two peers to = dynamically
negotiate the cryptography material for IPSec = in a secure way.
An example of IKE policies could be:

ike {
=            proposal= proposal-1 {
=             &n= bsp;          authentica= tion-method pre-shared-keys;
=             &n= bsp;          dh-group = group1;
=             &n= bsp;          authentica= tion-algorithm sha1;
=             &n= bsp;          encryption= -algorithm 3des-cbc;
=             &n= bsp;          lifetime-s= econds 1000;
=            }
=            proposal= proposal-2 {
=             &n= bsp;          authentica= tion-method pre-shared-keys;
=             &n= bsp;          dh-group = group2;
=             &n= bsp;          authentica= tion-algorithm md5;
=             &n= bsp;          encryption= -algorithm des-cbc;
=             &n= bsp;          lifetime-s= econds 10000;
}

Best regards, = Gabi.


El 22 oct 2015, a las = 10:19, Rafa Marin Lopez <rafa@um.es> escribi=A8=AE:

Dear Linda:

First of all, thanks = for commenting on our draft.


El 22 oct 2015, a las 0:43, Linda Dunbar <linda.dunbar@huawei.com>
escribi=A8=AE:
Rafa,

Thank you = very much for sharing the draft.

Can you = elaborate what kind of IPSec policies that Apps can give to
"SDN Controller=A1=B1?
I am not an expert on = IPSec, so pardon me if my question is not
correct: =  if client needs "protected IPsec traffic", can them simply
establish two parallel IPSec tunnels?

Any question is good. So, thank you. Let me try to clarify. = When you
want to establish an IPsec protected tunnel you = have to configure
rules/policies to determine what kind of = traffic you want to protect.

Imagine you = have* :

Network A(172.16.1.0/24) =A1=AA = GW_A
(192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - = (172.16.2.0/24)
Network_B

With = ipsec-tools in Linux you define the following policies to protect
traffic between both networks with a tunnel. Administrators = of both
networks have to configure this in both GW_A and = GW_B :

spdadd 172.16.1.0/24 172.16.2.0/24 = any -P out ipsec
=          esp/tunnel/192.168.1= .100-192.168.2.100/require;

spdadd = 172.16.2.0/24 172.16.1.0/24 any -P in ipsec
=          esp/tunnel/192.168.2= .100-192.168.1.100/require;

*See the = detailed example in Fig. 5 in
http://www.ipsec-howto.org/x304.html

Moreover it has to specify other parameters such as = credentials to be
used to establish IKE SA, cryptographic = algorithms etc=A1=AD



What is your goal? Only to give use cases for IPSec = policy?

Our goal is to automatize the = management of IPsec security associations
so that = administrators do not have add those rules in each device. The
general idea stemmed from the following principle:

To establish an IPsec security association you = run first IKE to
negotiate the IPsec SA (control plane). = Once it is established some
parameters are configured in = the kernel of the network devices, so they
can process the = IP packets with IPsec before forwarding (data plane). So
for= us, there is a clear separation between these two planes.

Additionally, please think that IPsec uses = packet filtering (and
cryptography). In this sense we = consider that a NSF can perform this
task. Thus, some = interface as those to be defined in I2NSF may be
required. = Btw, you can find a YANG model for ipsec in the following link:

https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00



Or do you plan = to dive in one step further to define the semantics of
the = polices or rules for IPSec?

If I understand = correctly your question I will say the semantics and
rules = for IPsec are already there as shown in the example. Another thing
to consider is to define through an application a more = general rule such
as =A1=B0I want to protect traffic = against eavesdropping between these two
networks" that is = finally translated in more specific IPsec policies

We hope this clarify your doubts. In any case, if you have = any other
question do not hesitate to ask.
Best Regards.


Thanks, Linda

-----Original = Message-----
From: I2nsf [mailto:i2nsf-bounces@ietf.org] = On Behalf Of Rafa Marin
Lopez
Sent: = Wednesday, October 21, 2015 4:15 AM
To: sdn@irtf.org; = i2nsf@ietf.org
Cc: Gabriel Lopez; Alejandro Abad UM; Rafa = Marin Lopez
Subject: [I2nsf] New update of
draft-abad-sdnrg-sdn-ipsec-flow-protection

Dear all:

You may find a new = update about Software-Defined Networking (SDN)-based
IPsec = Flow Protection in this link:


https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-prote= ction-01.t
xt

We have added = some minor modifications and a section to explain the
relationship with I2NSF work.

Comments are really welcome.

Best = Regards.

-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and = Communications Engineering (DIIC) Faculty of
Computer = Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
-------------------------------------------------------




_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and = Communications Engineering (DIIC)
Faculty of Computer = Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
-------------------------------------------------------




_______________________________________________
sdn mailing list
sdn@irtf.org
https://www.irtf.org/mailman/listinfo/sdn



-----------------------------------------------------------
Gabriel L=A8=AEpez Mill=A8=A2n
Departamento de = Ingenier=A8=AAa de la Informaci=A8=AEn y las Comunicaciones
University of Murcia
Spain
Tel: = +34 868888504
Fax: +34 868884151
email: = gabilm@um.es

-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and = Communications Engineering (DIIC)
Faculty of Computer = Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
-------------------------------------------------------




_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf





-----------------------------------------------------------
Gabriel L=A8=AEpez Mill=A8=A2n
Departamento de = Ingenier=A8=AAa de la Informaci=A8=AEn y las Comunicaciones
University of Murcia
Spain
Tel: = +34 868888504
Fax: +34 868884151
email: gabilm@um.es




= --Apple-Mail=_7342DEE8-2477-451F-8B0A-0A018D495361-- --Apple-Mail=_F67A2683-9731-4F49-99F1-D6BB0C65A83D Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQEcBAEBCAAGBQJWKgSgAAoJEMUYqoSNEZFTLOkIAIh5SB/P60YXeGFTmcw6MnzZ OUsYD4wcgN/bTxdP1PMbYU/Jqx+KVXfhWuIlHH7ESWmyJdijgSBB1595CoOlYVdd zKpS72wn/LQHLgvGRvfJB46bz6BFMJDBNyD//+YM4NPD1IdzdGoxzEpJ8mjer8wQ D9orTo+ro5LIdJn9j4Yb9Zb3dj568Yqrae7Tdw3JM7S9lWkMnwY8KQDdetOWJLIa PkM4fVFR42Z/7Rppp9ypBgwKvYGgcUH4vOAXNJnG9Rqc/8XbYUZAxB4H3dpZj2tI jBC2d9Zv2vRJRahEJQCGuhWm0GUlYJ7h7Qbh6X2MoJtaSjTCg2hT2sJxAnag7SE= =y3Ft -----END PGP SIGNATURE----- --Apple-Mail=_F67A2683-9731-4F49-99F1-D6BB0C65A83D-- From nobody Mon Oct 26 15:50:39 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD7F41A890E for ; Mon, 26 Oct 2015 15:50:37 -0700 (PDT) X-Quarantine-ID: <3wnrcKWqwfFX> X-Virus-Scanned: amavisd-new at amsl.com X-Amavis-Alert: BANNED, message contains application/ms-tnef, .tnef, winmail.dat X-Spam-Flag: NO X-Spam-Score: -3.421 X-Spam-Level: X-Spam-Status: No, score=-3.421 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_NEUTRAL=0.779] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3wnrcKWqwfFX for ; Mon, 26 Oct 2015 15:50:35 -0700 (PDT) Received: from ignavia.lancs.ac.uk (ignavia.lancs.ac.uk [148.88.25.16]) by ietfa.amsl.com (Postfix) with ESMTP id 333231A88F9 for ; Mon, 26 Oct 2015 15:50:35 -0700 (PDT) Received: from ex-0-ht0.lancs.ac.uk ([10.42.18.47] helo=EX-0-HT0.lancs.local) by ignavia.lancs.ac.uk with esmtp (Exim 4.72) (envelope-from ) id 1Zqqb4-00021I-6N for sdn@irtf.org; Mon, 26 Oct 2015 22:50:34 +0000 Received: from EX-0-MB2.lancs.local ([fe80::9d98:936b:54d1:c531]) by EX-0-HT0.lancs.local ([fe80::7d10:114a:53b0:7f2f%12]) with mapi id 14.03.0248.002; Mon, 26 Oct 2015 22:50:33 +0000 Content-Type: multipart/mixed; boundary="_000_65174429B5AF4C45BD0798810EC48E0A324912E4EX0MB2lancsloca_" From: "King, Daniel" To: "'sdn@irtf.org'" Thread-Topic: Updated SDN RG Agenda for IETF 94 Thread-Index: AdEQPgWe3Yn7s4iDRoCdY7bh+xWmKg== X-VoiceMessageDuration: 1 Date: Mon, 26 Oct 2015 22:50:32 +0000 Message-ID: <65174429B5AF4C45BD0798810EC48E0A324912E4@EX-0-MB2.lancs.local> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: <65174429B5AF4C45BD0798810EC48E0A324912E4@EX-0-MB2.lancs.local> x-originating-ip: [178.208.162.200] x-iss-local-domain: 1 MIME-Version: 1.0 Archived-At: Subject: [Sdn] Updated SDN RG Agenda for IETF 94 X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 22:50:37 -0000 --_000_65174429B5AF4C45BD0798810EC48E0A324912E4EX0MB2lancsloca_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Dear SDN Researchers, Please find below the latest SDN Research Group agenda for our Yokohama ses= sion. Date: Monday, November 2, 2015. Time: 9:00-11:30 Monday Morning session I Location: Room 502 Agenda: https://www.ietf.org/proceedings/94/agenda/agenda-94-sdnrg Presenters, please ( ) provide yo= ur slides no later than Sunday November 1st (AM JST). Mina-san douzo yoi-tabi wo, Yokohama de oai-dekiru nowo tanoshimi-ni shitei= masu. (Safe travels and looking forward to our Yokohama research group meet= ing.) BR, Dan. --_000_65174429B5AF4C45BD0798810EC48E0A324912E4EX0MB2lancsloca_ Content-Disposition: attachment; filename="winmail.dat" Content-Transfer-Encoding: base64 Content-Type: application/ms-tnef; name="winmail.dat" eJ8+IuwbAQaQCAAEAAAAAAABAAEAAQeQBgAIAAAA5AQAAAAAAADoAAEJgAEAIQAAAERGQjRFMkE3 NzQzQzRENEFBRTA3Q0Q1QjAyRjFCQjc2AHIHAQ2ABAACAAAAAgACAAEFgAMADgAAAN8HCgAaABYA MgAgAAEAcwEBIIADAA4AAADfBwoAGgAWADIAIAABAHMBAQiABwAYAAAASVBNLk1pY3Jvc29mdCBN YWlsLk5vdGUAMQgBBIABACIAAABVcGRhdGVkIFNETiBSRyBBZ2VuZGEgZm9yIElFVEYgOTQAIQoB A5AGAHAXAABEAAAAAgF/AAEAAABAAAAAPDY1MTc0NDI5QjVBRjRDNDVCRDA3OTg4MTBFQzQ4RTBB MzI0OTEyRTRARVgtMC1NQjIubGFuY3MubG9jYWw+AAIBExABAAAApQwAADxodG1sIHhtbG5zOnY9 InVybjpzY2hlbWFzLW1pY3Jvc29mdC1jb206dm1sIiB4bWxuczpvPSJ1cm46c2NoZW1hcy1taWNy b3NvZnQtY29tOm9mZmljZTpvZmZpY2UiIHhtbG5zOnc9InVybjpzY2hlbWFzLW1pY3Jvc29mdC1j b206b2ZmaWNlOndvcmQiIHhtbG5zOm09Imh0dHA6Ly9zY2hlbWFzLm1pY3Jvc29mdC5jb20vb2Zm aWNlLzIwMDQvMTIvb21tbCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnL1RSL1JFQy1odG1sNDAi PjxoZWFkPjxtZXRhIGh0dHAtZXF1aXY9Q29udGVudC1UeXBlIGNvbnRlbnQ9InRleHQvaHRtbDsg Y2hhcnNldD11cy1hc2NpaSI+PG1ldGEgbmFtZT1HZW5lcmF0b3IgY29udGVudD0iTWljcm9zb2Z0 IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPjxzdHlsZT48IS0tDQovKiBGb250IERlZmluaXRp b25zICovDQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgiOw0KCXBhbm9z ZS0xOjIgNCA1IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpDYWxp YnJpOw0KCXBhbm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9u dC1mYW1pbHk6Q29uc29sYXM7DQoJcGFub3NlLTE6MiAxMSA2IDkgMiAyIDQgMyAyIDQ7fQ0KLyog U3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWwsIGRpdi5Nc29O b3JtYWwNCgl7bWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXpl OjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgltc28tZmFyZWFz dC1sYW5ndWFnZTpFTi1VUzt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHls ZS1wcmlvcml0eTo5OTsNCgljb2xvcjojMDU2M0MxOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxp bmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1w cmlvcml0eTo5OTsNCgljb2xvcjojOTU0RjcyOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7 fQ0KcC5Nc29QbGFpblRleHQsIGxpLk1zb1BsYWluVGV4dCwgZGl2Lk1zb1BsYWluVGV4dA0KCXtt c28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IlBsYWluIFRleHQgQ2hhciI7 DQoJbWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjExLjBw dDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgltc28tZmFyZWFzdC1sYW5n dWFnZTpFTi1VUzt9DQpzcGFuLkVtYWlsU3R5bGUxNw0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25h bC1jb21wb3NlOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9yOndp bmRvd3RleHQ7fQ0Kc3Bhbi5QbGFpblRleHRDaGFyDQoJe21zby1zdHlsZS1uYW1lOiJQbGFpbiBU ZXh0IENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGluazoiUGxh aW4gVGV4dCI7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KLk1zb0NocERl ZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJbXNvLWZhcmVhc3QtbGFuZ3Vh Z2U6RU4tVVM7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6NjEyLjBwdCA3OTIuMHB0Ow0K CW1hcmdpbjo3Mi4wcHQgNzIuMHB0IDcyLjBwdCA3Mi4wcHQ7fQ0KZGl2LldvcmRTZWN0aW9uMQ0K CXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1s Pg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1s PjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpl eHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVs YXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+PC9oZWFkPjxib2R5IGxhbmc9RU4tR0IgbGluaz0iIzA1 NjNDMSIgdmxpbms9IiM5NTRGNzIiPjxkaXYgY2xhc3M9V29yZFNlY3Rpb24xPjxwIGNsYXNzPU1z b05vcm1hbD5EZWFyIFNETiBSZXNlYXJjaGVycywgPG86cD48L286cD48L3A+PHAgY2xhc3M9TXNv Tm9ybWFsPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD5QbGVhc2UgZmlu ZCBiZWxvdyB0aGUgbGF0ZXN0IFNETiBSZXNlYXJjaCBHcm91cCBhZ2VuZGEgZm9yIG91ciBZb2tv aGFtYSBzZXNzaW9uLjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48bzpwPiZuYnNw OzwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+RGF0ZTogTW9uZGF5LCBOb3ZlbWJlciAyLCAy MDE1LjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD5UaW1lOiA5OjAwLTExOjMwIE1v bmRheSBNb3JuaW5nIHNlc3Npb24gSTxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD5M b2NhdGlvbjogUm9vbSA1MDI8bzpwPjwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+QWdlbmRh OiA8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9wcm9jZWVkaW5ncy85NC9hZ2VuZGEvYWdl bmRhLTk0LXNkbnJnIj5odHRwczovL3d3dy5pZXRmLm9yZy9wcm9jZWVkaW5ncy85NC9hZ2VuZGEv YWdlbmRhLTk0LXNkbnJnPC9hPjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48bzpw PiZuYnNwOzwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+UHJlc2VudGVycywgcGxlYXNlICgm bHQ7Zmxvd2VycyZndDsgJmx0O2J1bm5pZXMmZ3Q7ICZsdDtiaXJkcyBtb2RlPXR3ZWV0aW5nJmd0 OykgcHJvdmlkZSB5b3VyIHNsaWRlcyBubyBsYXRlciB0aGFuIFN1bmRheSBOb3ZlbWJlciAxPHN1 cD5zdDwvc3VwPiAoQU0gSlNUKS4gJm5ic3A7PG86cD48L286cD48L3A+PHAgY2xhc3M9TXNvTm9y bWFsPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD5NaW5hLXNhbiBkb3V6 byB5b2ktdGFiaSB3bywgWW9rb2hhbWEgZGUgb2FpLWRla2lydSBub3dvIHRhbm9zaGltaS1uaSBz aGl0ZWltYXN1LiAoU2FmZSB0cmF2ZWxzIGFuZCBsb29raW5nIGZvcndhcmQgdG8gb3VyIFlva29o YW1hIHJlc2VhcmNoIGdyb3VwIG1lZXRpbmcuKTxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05v cm1hbD48bzpwPiZuYnNwOzwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+QlIsIERhbi48bzpw PjwvbzpwPjwvcD48L2Rpdj48L2JvZHk+PC9odG1sPgAAAB8AQgABAAAAGgAAAEsAaQBuAGcALAAg AEQAYQBuAGkAZQBsAAAAAAAfAGUAAQAAAC4AAABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQA ZQByAC4AYQBjAC4AdQBrAAAAAAAfAGQAAQAAAAoAAABTAE0AVABQAAAAAAACAUEAAQAAAGoAAAAA AAAAgSsfpL6jEBmdbgDdAQ9UAgAAAIBLAGkAbgBnACwAIABEAGEAbgBpAGUAbAAAAFMATQBUAFAA AABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAAAAAfAAJdAQAA AC4AAABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAAAAAfAOVf AQAAAAQAAAAgAAAAHwAaDAEAAAAaAAAASwBpAG4AZwAsACAARABhAG4AaQBlAGwAAAAAAB8AHwwB AAAALgAAAGQALgBrAGkAbgBnAEAAbABhAG4AYwBhAHMAdABlAHIALgBhAGMALgB1AGsAAAAAAB8A HgwBAAAACgAAAFMATQBUAFAAAAAAAAIBGQwBAAAAagAAAAAAAACBKx+kvqMQGZ1uAN0BD1QCAAAA gEsAaQBuAGcALAAgAEQAYQBuAGkAZQBsAAAAUwBNAFQAUAAAAGQALgBrAGkAbgBnAEAAbABhAG4A YwBhAHMAdABlAHIALgBhAGMALgB1AGsAAAAAAB8AAV0BAAAALgAAAGQALgBrAGkAbgBnAEAAbABh AG4AYwBhAHMAdABlAHIALgBhAGMALgB1AGsAAAAAAB8A+D8BAAAAGgAAAEsAaQBuAGcALAAgAEQA YQBuAGkAZQBsAAAAAAAfACNAAQAAAC4AAABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQBy AC4AYQBjAC4AdQBrAAAAAAAfACJAAQAAAAoAAABTAE0AVABQAAAAAAACAfk/AQAAAGoAAAAAAAAA gSsfpL6jEBmdbgDdAQ9UAgAAAIBLAGkAbgBnACwAIABEAGEAbgBpAGUAbAAAAFMATQBUAFAAAABk AC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAAAAAfAAldAQAAAC4A AABkAC4AawBpAG4AZwBAAGwAYQBuAGMAYQBzAHQAZQByAC4AYQBjAC4AdQBrAAAAAAALAEA6AQAA AB8AGgABAAAAEgAAAEkAUABNAC4ATgBvAHQAZQAAAAAAAwDxPwkEAAALAEA6AQAAAAMA/T/kBAAA AgELMAEAAAAQAAAA37Tip3Q8TUquB81bAvG7dgMAFwABAAAAQAA5AABs6rdAENEBQAAIMBBNd7hA ENEBCwApAAAAAAALACMAAAAAAB8AAICGAwIAAAAAAMAAAAAAAABGAQAAAB4AAABhAGMAYwBlAHAA dABsAGEAbgBnAHUAYQBnAGUAAAAAAAEAAAAaAAAAZQBuAC0ARwBCACwAIABlAG4ALQBVAFMAAAAA AAsAAIAIIAYAAAAAAMAAAAAAAABGAAAAAAaFAAAAAAAAHwA3AAEAAABEAAAAVQBwAGQAYQB0AGUA ZAAgAFMARABOACAAUgBHACAAQQBnAGUAbgBkAGEAIABmAG8AcgAgAEkARQBUAEYAIAA5ADQAAAAf AD0AAQAAAAIAAAAAAAAAAwA2AAAAAAACAXEAAQAAABYAAAAB0RA+BZ7difuziINGgJ1jtuH7FaYq AAAfAHAAAQAAAEQAAABVAHAAZABhAHQAZQBkACAAUwBEAE4AIABSAEcAIABBAGcAZQBuAGQAYQAg AGYAbwByACAASQBFAFQARgAgADkANAAAAB8ANRABAAAAgAAAADwANgA1ADEANwA0ADQAMgA5AEIA NQBBAEYANABDADQANQBCAEQAMAA3ADkAOAA4ADEAMABFAEMANAA4AEUAMABBADMAMgA0ADkAMQAy AEUANABAAEUAWAAtADAALQBNAEIAMgAuAGwAYQBuAGMAcwAuAGwAbwBjAGEAbAA+AAAAAwDeP59O AAADAACACCAGAAAAAADAAAAAAAAARgAAAAABhQAAAAAAAAMAgBD/////QAAHME2jZrhAENEBCwAC AAEAAAADACYAAAAAAAIBRwABAAAAPAAAAGM9R0I7YT0gO3A9TGFuY2FzdGVyIFVuaXZlcjtsPUVY LTAtTUIyLTE1MTAyNjIyNTAzMlotMTA3MzI3AAIBEDABAAAARgAAAAAAAADkVvWlfM8GQqVN9k4w QvYvBwAX08HG8KmqTrxoww472Pu6AAAEwPd1AAATLXYPs0SoQ7nIwEKFeuAIADIwRI5QAAAAAB8A +j8BAAAAGgAAAEsAaQBuAGcALAAgAEQAYQBuAGkAZQBsAAAAAAADAAJZAAAWAAMACVkCAAAAAwAB aAEAAAADAAZotyQAAAMAB2gAAAAAAwAIaAAAAAADAAloAQAAAB8ACmgBAAAAAgAAAAAAAAALAAto AAAAAAMADGgAAAAAAwAQaAAAAAADAACACCAGAAAAAADAAAAAAAAARgAAAAAQhQAAAAAAAAMAAIAI IAYAAAAAAMAAAAAAAABGAAAAABiFAAAAAAAACwAAgAggBgAAAAAAwAAAAAAAAEYAAAAAgoUAAAAA AAALAACACCAGAAAAAADAAAAAAAAARgAAAAAOhQAAAAAAAEAAAIAIIAYAAAAAAMAAAAAAAABGAAAA AL+FAADQvLe6QBDRAR8AAIAfpOszqHouQr57eeGpjlSzAQAAADgAAABDAG8AbgB2AGUAcgBzAGEA dABpAG8AbgBJAG4AZABlAHgAVAByAGEAYwBrAGkAbgBnAEUAeAAAAAEAAAC6AAAASQBJAD0AMAAx AEQAMQAxADAAMwBFADAANQA5AEUARABEADgAOQBGAEIAQgAzADgAOAA4ADMANAA2ADgAMAA5AEQA NgAzAEIANgBFADEARgBCADEANQBBADYAMgBBADsAVgBlAHIAcwBpAG8AbgA9AFYAZQByAHMAaQBv AG4AIAAxADQALgAzACAAKABCAHUAaQBsAGQAIAAyADQAOAAuADAAKQAsACAAUwB0AGEAZwBlAD0A SAA0AAAAAAADAACACCAGAAAAAADAAAAAAAAARgAAAADrhQAACQgAAAMADTT9PwAAHwAAgIYDAgAA AAAAwAAAAAAAAEYBAAAAIAAAAHgALQBtAHMALQBoAGEAcwAtAGEAdAB0AGEAYwBoAAAAAQAAAAIA AAAAAAAAHwAAgIYDAgAAAAAAwAAAAAAAAEYBAAAAIgAAAHgALQBvAHIAaQBnAGkAbgBhAHQAaQBu AGcALQBpAHAAAAAAAAEAAAAkAAAAWwAxADcAOAAuADIAMAA4AC4AMQA2ADIALgAyADAAMABdAAAA HwAAgIYDAgAAAAAAwAAAAAAAAEYBAAAAJgAAAHgALQBpAHMAcwAtAGwAbwBjAGEAbAAtAGQAbwBt AGEAaQBuAAAAAAABAAAABAAAADEAAABOzQ== --_000_65174429B5AF4C45BD0798810EC48E0A324912E4EX0MB2lancsloca_-- From nobody Mon Oct 26 15:54:38 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B4E21A8ABA for ; Sun, 18 Oct 2015 08:29:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id caanGLE6Po1x for ; Sun, 18 Oct 2015 08:29:11 -0700 (PDT) Received: from mail-pink.research.att.com (mail-pink.research.att.com [204.178.8.22]) by ietfa.amsl.com (Postfix) with ESMTP id A9AB91A8ABC for ; Sun, 18 Oct 2015 08:29:11 -0700 (PDT) Received: from mail-blue.research.att.com (unknown [135.207.178.11]) by mail-pink.research.att.com (Postfix) with ESMTP id A24F412217F; Sun, 18 Oct 2015 11:54:19 -0400 (EDT) Received: from exchange.research.att.com (njfpsrvexg0.research.att.com [135.207.255.124]) by mail-blue.research.att.com (Postfix) with ESMTP id 383ADF042D; Sun, 18 Oct 2015 11:26:42 -0400 (EDT) Received: from NJFPSRVEXG0.research.att.com ([fe80::108a:1006:9f54:fd90]) by NJFPSRVEXG0.research.att.com ([fe80::108a:1006:9f54:fd90%25]) with mapi; Sun, 18 Oct 2015 11:26:41 -0400 From: "MORTON, ALFRED C (AL)" To: "adrian@olddog.co.uk" , "bmwg@ietf.org" Date: Sun, 18 Oct 2015 11:26:40 -0400 Thread-Topic: [bmwg] Terminology for Benchmarking SDN Controller Performance Thread-Index: AdEJt6+16GzWpCoBQdikkjQmR6Q75gAAN1LQ Message-ID: <4AF73AA205019A4C8A1DDD32C034631D0BB67F953D@NJFPSRVEXG0.research.att.com> References: <006d01d109b8$5dbaf120$1930d360$@olddog.co.uk> In-Reply-To: <006d01d109b8$5dbaf120$1930d360$@olddog.co.uk> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:36 -0700 Cc: "sdn@irtf.org" Subject: Re: [Sdn] [bmwg] Terminology for Benchmarking SDN Controller Performance X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Oct 2015 15:29:13 -0000 Hi Adrian, thanks for your comment. One of my earlier comments (as co-chair, I believe) was that the terminology needed to be synchronized with RFC 7426 (which had just been published when I made the comment). I see that the authors reproduced the definitions from RFCs, rather than listing them as terms defined elsewhere. "path" from RFC 2330 is another example. So, the first comment is to embrace the existing terminology through references. Then, more of us will be using the same terms, and reviews of this work will be more efficient. regards, Al (as co-chair) > -----Original Message----- > From: bmwg [mailto:bmwg-bounces@ietf.org] On Behalf Of Adrian Farrel > Sent: Sunday, October 18, 2015 11:19 AM > To: bmwg@ietf.org > Cc: sdn@irtf.org > Subject: [bmwg] Terminology for Benchmarking SDN Controller Performance >=20 > Hi, >=20 > It surprises me that draft-ietf-bmwg-sdn-controller-benchmark-term makes > no reference to RFC 7426 but instead defines its own terminology. Why is > that? >=20 > Thanks, > Adrian > -- > Read my latest... > Tales from the Wood - Eighteen new fairy tales > http://www.feedaread.com/books/Tales-from-the-Wood-9781786100924.aspx > http://www.amazon.co.uk/Tales-Wood-Adrian-Farrel/dp/1786100924 > Or buy from me direct. >=20 >=20 >=20 > _______________________________________________ > bmwg mailing list > bmwg@ietf.org > https://www.ietf.org/mailman/listinfo/bmwg From nobody Mon Oct 26 15:54:40 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 871C41A1B8C for ; Mon, 19 Oct 2015 06:34:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.91 X-Spam-Level: X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aiVIpOfB-Bmx for ; Mon, 19 Oct 2015 06:34:36 -0700 (PDT) Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D37421A1B11 for ; Mon, 19 Oct 2015 06:34:35 -0700 (PDT) Received: from fr711usmtp1.zeu.alcatel-lucent.com (unknown [135.239.2.122]) by Websense Email Security Gateway with ESMTPS id AB64DD8ADE089 for ; Mon, 19 Oct 2015 13:34:31 +0000 (GMT) Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr711usmtp1.zeu.alcatel-lucent.com (GMO) with ESMTP id t9JDYW83004961 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for ; Mon, 19 Oct 2015 15:34:33 +0200 Received: from [172.27.205.110] (135.239.27.38) by FR712WXCHHUB03.zeu.alcatel-lucent.com (135.239.2.74) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 19 Oct 2015 15:34:32 +0200 References: <5624EEC3.40509@alcatel-lucent.com> To: From: Laurent Ciavaglia Organization: Alcatel-Lucent Bell Labs France X-Forwarded-Message-Id: <5624EEC3.40509@alcatel-lucent.com> Message-ID: <5624F167.7030600@alcatel-lucent.com> Date: Mon, 19 Oct 2015 15:34:31 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 MIME-Version: 1.0 In-Reply-To: <5624EEC3.40509@alcatel-lucent.com> Content-Type: multipart/alternative; boundary="------------080104000503040800070904" X-Originating-IP: [135.239.27.38] Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:37 -0700 Subject: [Sdn] Fwd: IETF94 / 38th NMRG meeting - Call for Contributions on Managing Networks of Adaptive and Cooperative Agents X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 13:34:38 -0000 --------------080104000503040800070904 Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit Dear SDN RG particpants, The call for the next NMRG meeting in Yokohama might be of interest to you. Thanks, Laurent. -------- Forwarded Message -------- Subject: IETF94 / 38th NMRG meeting - Call for Contributions on Managing Networks of Adaptive and Cooperative Agents Date: Mon, 19 Oct 2015 15:23:15 +0200 From: Laurent Ciavaglia Organization: Alcatel-Lucent Bell Labs France To: nmrg@irtf.org CC: Lisandro Zambenedetti Granville , Olivier Festor Dear NMRG community, On behalf of the NMRG Chairs, please find below a call for contributions for the upcoming NMRG meeting during IETF94 week in Yokohama. Thanks, best regards, Laurent. *** CALL FOR CONTRIBUTIONS *** *Managing Networks of Adaptive and Cooperative Agents* As communication networks become more capable and more autonomous, new challenges arise for their (self-)organization and (self-)operation. How can management adapt and cope with the increased dynamicity and versatility introduced by networks composed of adaptive and cooperative agents? This 38th NMRG meeting aims at exploring new techniques and approaches, from various disciplines, addressing (but not limited to) the following questions and challenges: -How to steer the global network behavior resulting from self-organization where agents have their own goals and actions? -What could be the role of intent-based networking in situation where the system's goal "emerges" from the agents interactions? -How to build and leverage the knowledge produced at the micro (agent) and macro (network) levels? How to correlate and make sense out of measurements and data from heterogeneous sources? -How to verify and test the behavior of systems with the intrinsic faculty of adapting to changing conditions? -How to make the operations scale? To which extent are the new techniques and solutions actionable, "computable"...? -What coordination schemes could be designed to both take benefits from the agents' built-in ability to cooperate and guarantee an overall safe network operation in the presence of different (sometimes conflicting) goals? -How can the management techniques leverage on the new properties and features introduced by adaptive and cooperative agents, i.e. applying the same techniques to the management plane itself. The main goal of the meeting is to identify topics of high interest for further research and investigations by the network management community, highlighting the potential needs for future standardization. To this end, the meeting will have a few short presentations and hopefully enough time for open and fruitful discussions . Please send your proposal for presentation to the NMRG mailing list and kindly include: Topic: Presenter name: Time requested: Brief description of the topic: Pointer to references (internet draft(s), paper(s), website...) if any: The 38th NMRG meeting will take place on Monday, November 2, 2015 - from 17:10 to 19:10 - in room 413. *** -- Bien cordialement, Best regards, *Laurent Ciavaglia* Secure Cloud Networking Bell Labs | Alcatel Lucent phone: +33 160 402 636 email: laurent.ciavaglia@alcatel-lucent.com linkedin: laurentciavaglia address: Route de Villejust | 91620 Nozay | France --------------080104000503040800070904 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: 8bit Dear SDN RG particpants,

The call for the next NMRG meeting in Yokohama might be of interest to you.

Thanks, Laurent.



-------- Forwarded Message --------
Subject: IETF94 / 38th NMRG meeting - Call for Contributions on Managing Networks of Adaptive and Cooperative Agents
Date: Mon, 19 Oct 2015 15:23:15 +0200
From: Laurent Ciavaglia <Laurent.Ciavaglia@alcatel-lucent.com>
Organization: Alcatel-Lucent Bell Labs France
To: nmrg@irtf.org <nmrg@irtf.org>
CC: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>, Olivier Festor <Olivier.Festor@inria.fr>


Dear NMRG community,

On behalf of the NMRG Chairs, please find below a call for contributions for the upcoming NMRG meeting during IETF94 week in Yokohama.

Thanks, best regards, Laurent.


        ***  CALL FOR CONTRIBUTIONS  ***
Managing Networks of Adaptive and Cooperative Agents

As communication networks become more capable and more autonomous, new challenges arise for their (self-)organization and (self-)operation.
How can management adapt and cope with the increased dynamicity and versatility introduced by networks composed of adaptive and cooperative agents?
This 38th NMRG meeting aims at exploring new techniques and approaches, from various disciplines, addressing (but not limited to) the following questions and challenges:
    -How to steer the global network behavior resulting from self-organization where agents have their own goals and actions?
    -What could be the role of intent-based networking in situation where the system's goal "emerges" from the agents interactions?
    -How to build and leverage the knowledge produced at the micro (agent) and macro (network) levels? How to correlate and make sense out of measurements and data from heterogeneous sources?
    -How to verify and test the behavior of systems with the intrinsic faculty of adapting to changing conditions?
    -How to make the operations scale? To which extent are the new techniques and solutions actionable, "computable"...?
    -What coordination schemes could be designed to both take benefits from the agents' built-in ability to cooperate and guarantee an overall safe network operation in the presence of different (sometimes conflicting) goals?
    -How can the management techniques leverage on the new properties and features introduced by adaptive and cooperative agents, i.e. applying the same techniques to the management plane itself.

The main goal of the meeting is to identify topics of high interest for further research and investigations by the network management community, highlighting the potential needs for future standardization.
To this end, the meeting will have a few short presentations and hopefully enough time for open and fruitful discussions    .
Please send your proposal for presentation to the NMRG mailing list and kindly include:
    Topic:
    Presenter name:
    Time requested:
    Brief description of the topic:
    Pointer to references (internet draft(s), paper(s), website...) if any:

The 38th NMRG meeting will take place on Monday, November 2, 2015 - from 17:10 to 19:10 - in room 413.

***



--

Bien cordialement, Best regards,

 

Laurent Ciavaglia

Secure Cloud Networking

Bell Labs | Alcatel Lucent

 

phone: +33 160 402 636

email: laurent.ciavaglia@alcatel-lucent.com

linkedin: laurentciavaglia

address: Route de Villejust | 91620 Nozay | France



--------------080104000503040800070904-- From nobody Mon Oct 26 15:54:41 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A0D91A0187 for ; Fri, 23 Oct 2015 06:46:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.91 X-Spam-Level: X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FwOqxQcHjeqf for ; Fri, 23 Oct 2015 06:46:05 -0700 (PDT) Received: from mail.painless-security.com (mail.painless-security.com [23.30.188.241]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BC691A0167 for ; Fri, 23 Oct 2015 06:46:05 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mail.painless-security.com (Postfix) with ESMTP id 376D820802; Fri, 23 Oct 2015 09:44:13 -0400 (EDT) Received: from mail.painless-security.com ([127.0.0.1]) by localhost (mail.suchdamage.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HTUH2N8tb1UA; Fri, 23 Oct 2015 09:44:12 -0400 (EDT) Received: from carter-zimmerman.suchdamage.org (c-50-136-30-120.hsd1.ma.comcast.net [50.136.30.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.painless-security.com (Postfix) with ESMTPS; Fri, 23 Oct 2015 09:44:12 -0400 (EDT) Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id A685A88CA5; Fri, 23 Oct 2015 09:45:57 -0400 (EDT) From: Sam Hartman To: Gabriel Lopez References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> Date: Fri, 23 Oct 2015 09:45:57 -0400 In-Reply-To: (Gabriel Lopez's message of "Fri, 23 Oct 2015 11:57:51 +0200") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:36 -0700 Cc: "sdn@irtf.org" , mark@painless-security.com, Alejandro Abad UM , "i2nsf@ietf.org" , Linda Dunbar , margaret@painless-security.com, Rafa Marin Lopez , Mahesh Jethanandani , Dacheng Zhang Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 13:46:06 -0000 This does seem interesting even if if beyond the scope of I2NSF. Are you going to be in Japan? I will not, but margaret and Mark from Painless Security will be. From nobody Mon Oct 26 15:54:43 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BAF81A0060 for ; Thu, 22 Oct 2015 01:31:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yNEBD1f5afwT for ; Thu, 22 Oct 2015 01:31:55 -0700 (PDT) Received: from xenon23.um.es (xenon23.um.es [155.54.212.163]) by ietfa.amsl.com (Postfix) with ESMTP id BEF891A6F80 for ; Thu, 22 Oct 2015 01:31:54 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon23.um.es (Postfix) with ESMTP id 0FE2F36ED; Thu, 22 Oct 2015 10:31:54 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon23.um.es Received: from xenon23.um.es ([127.0.0.1]) by localhost (xenon23.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 24fOUt3UM9RK; Thu, 22 Oct 2015 10:31:53 +0200 (CEST) Received: from [192.168.1.3] (16.Red-83-37-40.dynamicIP.rima-tde.net [83.37.40.16]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: gabilm) by xenon23.um.es (Postfix) with ESMTPSA id 7DFE9366A; Thu, 22 Oct 2015 10:31:50 +0200 (CEST) Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) Content-Type: multipart/signed; boundary="Apple-Mail=_90DCC732-93F9-47FD-93EC-1E1737200F88"; protocol="application/pgp-signature"; micalg=pgp-sha256 X-Pgp-Agent: GPGMail 2.6b2 From: Gabriel Lopez In-Reply-To: <89725C38-5C24-44B2-9957-BAD267993F92@um.es> Date: Thu, 22 Oct 2015 10:31:48 +0200 Message-Id: <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> To: Rafa Marin Lopez X-Mailer: Apple Mail (2.3094) Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:37 -0700 Cc: "i2nsf@ietf.org" , "sdn@irtf.org" , Alejandro Abad UM , Linda Dunbar Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Oct 2015 08:31:58 -0000 --Apple-Mail=_90DCC732-93F9-47FD-93EC-1E1737200F88 Content-Type: multipart/alternative; boundary="Apple-Mail=_664D6299-A7F6-471E-BB19-9000CF52641F" --Apple-Mail=_664D6299-A7F6-471E-BB19-9000CF52641F Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi, Thanks for the review. Please, note that the draft also include IKE policies. As described in Rafa=E2=80=99s response, IKE allows two peers to = dynamically negotiate the cryptography material for IPSec in a secure = way. An example of IKE policies could be: ike { proposal proposal-1 { authentication-method pre-shared-keys; dh-group group1; authentication-algorithm sha1; encryption-algorithm 3des-cbc; lifetime-seconds 1000; } proposal proposal-2 { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm md5; encryption-algorithm des-cbc; lifetime-seconds 10000; } Best regards, Gabi. > El 22 oct 2015, a las 10:19, Rafa Marin Lopez escribi=C3=B3= : >=20 > Dear Linda: >=20 > First of all, thanks for commenting on our draft. >=20 >> El 22 oct 2015, a las 0:43, Linda Dunbar > escribi=C3=B3: >>=20 >> Rafa, >>=20 >> Thank you very much for sharing the draft. >>=20 >> Can you elaborate what kind of IPSec policies that Apps can give to = "SDN Controller=E2=80=9D? >> I am not an expert on IPSec, so pardon me if my question is not = correct: if client needs "protected IPsec traffic", can them simply = establish two parallel IPSec tunnels? >=20 > Any question is good. So, thank you. Let me try to clarify. When you = want to establish an IPsec protected tunnel you have to configure = rules/policies to determine what kind of traffic you want to protect. >=20 > Imagine you have* : >=20 > Network A(172.16.1.0/24) =E2=80=94 GW_A = (192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - (172.16.2.0/24) = Network_B >=20 > With ipsec-tools in Linux you define the following policies to protect = traffic between both networks with a tunnel. Administrators of both = networks have to configure this in both GW_A and GW_B : >=20 > spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec > esp/tunnel/192.168.1.100-192.168.2.100/require; >=20 > spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec > esp/tunnel/192.168.2.100-192.168.1.100/require; >=20 > *See the detailed example in Fig. 5 in = http://www.ipsec-howto.org/x304.html = >=20 > Moreover it has to specify other parameters such as credentials to be = used to establish IKE SA, cryptographic algorithms etc=E2=80=A6 >=20 >>=20 >> What is your goal? Only to give use cases for IPSec policy? >=20 > Our goal is to automatize the management of IPsec security = associations so that administrators do not have add those rules in each = device. The general idea stemmed from the following principle: >=20 > To establish an IPsec security association you run first IKE to = negotiate the IPsec SA (control plane). Once it is established some = parameters are configured in the kernel of the network devices, so they = can process the IP packets with IPsec before forwarding (data plane). So = for us, there is a clear separation between these two planes. >=20 > Additionally, please think that IPsec uses packet filtering (and = cryptography). In this sense we consider that a NSF can perform this = task. Thus, some interface as those to be defined in I2NSF may be = required. Btw, you can find a YANG model for ipsec in the following = link: >=20 > https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00 = >=20 >=20 >> Or do you plan to dive in one step further to define the semantics of = the polices or rules for IPSec? >=20 > If I understand correctly your question I will say the semantics and = rules for IPsec are already there as shown in the example. Another thing = to consider is to define through an application a more general rule such = as =E2=80=9CI want to protect traffic against eavesdropping between = these two networks" that is finally translated in more specific IPsec = policies >=20 > We hope this clarify your doubts. In any case, if you have any other = question do not hesitate to ask. >=20 > Best Regards. >>=20 >> Thanks, Linda >>=20 >> -----Original Message----- >> From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin = Lopez >> Sent: Wednesday, October 21, 2015 4:15 AM >> To: sdn@irtf.org; i2nsf@ietf.org >> Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez >> Subject: [I2nsf] New update of = draft-abad-sdnrg-sdn-ipsec-flow-protection >>=20 >> Dear all: >>=20 >> You may find a new update about Software-Defined Networking = (SDN)-based IPsec Flow Protection in this link: >>=20 >> = https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.tx= t >>=20 >> We have added some minor modifications and a section to explain the = relationship with I2NSF work. >>=20 >> Comments are really welcome. >>=20 >> Best Regards. >>=20 >> ------------------------------------------------------- >> Rafael Marin Lopez, PhD >> Dept. Information and Communications Engineering (DIIC) Faculty of = Computer Science-University of Murcia >> 30100 Murcia - Spain >> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >> ------------------------------------------------------- >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> I2nsf mailing list >> I2nsf@ietf.org >> https://www.ietf.org/mailman/listinfo/i2nsf >=20 > ------------------------------------------------------- > Rafael Marin Lopez, PhD > Dept. Information and Communications Engineering (DIIC) > Faculty of Computer Science-University of Murcia > 30100 Murcia - Spain > Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es = > ------------------------------------------------------- >=20 >=20 >=20 >=20 > _______________________________________________ > sdn mailing list > sdn@irtf.org > https://www.irtf.org/mailman/listinfo/sdn = ----------------------------------------------------------- Gabriel L=C3=B3pez Mill=C3=A1n Departamento de Ingenier=C3=ADa de la Informaci=C3=B3n y las = Comunicaciones University of Murcia Spain Tel: +34 868888504 Fax: +34 868884151 email: gabilm@um.es --Apple-Mail=_664D6299-A7F6-471E-BB19-9000CF52641F Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8

Hi,

Thanks for the review.

Please, note that the draft also = include IKE policies.

As described in Rafa=E2=80=99s response, IKE allows two peers = to dynamically negotiate the cryptography material for IPSec in a secure = way.
An example of IKE policies could be:

ike {
proposal = proposal-1 {
authentication-method = pre-shared-keys;
dh-group group1;
= authentication-algorithm sha1;
= encryption-algorithm 3des-cbc;
= lifetime-seconds 1000;
}
proposal = proposal-2 {
authentication-method = pre-shared-keys;
dh-group group2;
= authentication-algorithm md5;
= encryption-algorithm des-cbc;
= lifetime-seconds 10000;
}

Best regards, Gabi.


El 22 oct 2015, a las 10:19, = Rafa Marin Lopez <rafa@um.es> escribi=C3=B3:

Dear Linda:

First of all, thanks for commenting on our = draft.

El 22 oct 2015, a las 0:43, = Linda Dunbar <linda.dunbar@huawei.com> escribi=C3=B3:

Rafa, 

Thank you very much for sharing the draft. 

Can you elaborate what kind of IPSec policies that Apps can = give to "SDN Controller=E2=80=9D? 
I am not an = expert on IPSec, so pardon me if my question is not correct:  if = client needs "protected IPsec traffic", can them simply establish two = parallel IPSec tunnels? 

Any question is good. So, thank you. Let me try = to clarify. When you want to establish an IPsec protected tunnel you = have to configure rules/policies to determine what kind of traffic you = want to protect. 

Imagine you have* :  

Network A(172.16.1.0/24) =E2=80=94 GW_A = (192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - (172.16.2.0/24) = Network_B

With ipsec-tools in Linux = you define the following policies to protect traffic between both = networks with a tunnel. Administrators of both networks have to = configure this in both GW_A and GW_B :

spdadd 172.16.1.0/24 172.16.2.0/24 any -P out = ipsec
          esp= /tunnel/192.168.1.100-192.168.2.100/require;

spdadd 172.16.2.0/24 172.16.1.0/24 any -P = in ipsec
          esp= /tunnel/192.168.2.100-192.168.1.100/require;

*See the detailed example in Fig. 5 = in http://www.ipsec-howto.org/x304.html

Moreover it has to specify other = parameters such as credentials to be used to establish IKE SA, = cryptographic algorithms etc=E2=80=A6


What is your goal? Only to give use cases for IPSec = policy?

Our goal is to automatize the management of = IPsec security associations so that administrators do not have add those = rules in each device. The general idea stemmed from the following = principle:

To establish an IPsec = security association you run first IKE to negotiate the IPsec SA = (control plane). Once it is established some parameters are configured = in the kernel of the network devices, so they can process the IP packets = with IPsec before forwarding (data plane). So for us, there is a clear = separation between these two planes.

Additionally, please think that IPsec uses = packet filtering (and cryptography). In this sense we consider that a = NSF can perform this task. Thus, some interface as those to be defined = in I2NSF may be required. Btw, you can find a YANG model for ipsec in = the following link:

https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00=


Or do you = plan to dive in one step further to define the semantics of the polices = or rules for IPSec?  

If I understand correctly = your question I will say the semantics and rules for IPsec are already = there as shown in the example. Another thing to consider is to define = through an application a more general rule such as =E2=80=9CI want to = protect traffic against eavesdropping between these two networks" that = is finally translated in more specific IPsec policies

We hope this clarify your doubts. In any = case, if you have any other question do not hesitate to ask. 

Best Regards.

Thanks, = Linda 
-----Original Message-----
From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin = Lopez
Sent: Wednesday, October 21, 2015 4:15 AM
To: sdn@irtf.org; i2nsf@ietf.org
Cc: Gabriel Lopez; Alejandro = Abad UM; Rafa Marin Lopez
Subject: [I2nsf] New update of = draft-abad-sdnrg-sdn-ipsec-flow-protection

Dear all:

You may find a new = update about Software-Defined Networking (SDN)-based IPsec Flow = Protection in this link:

https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-prote= ction-01.txt

We have added some minor = modifications and a section to explain the relationship with I2NSF = work.

Comments are really welcome.

Best Regards.

-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and = Communications Engineering (DIIC) Faculty of Computer Science-University = of Murcia
30100 Murcia - Spain
Telf: = +34868888501 Fax: +34868884151 e-mail: rafa@um.es
-------------------------------------------------------




_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

-------------------------------------------------------<= br style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; = font-variant: normal; font-weight: normal; letter-spacing: normal; = orphans: auto; text-align: start; text-indent: 0px; text-transform: = none; white-space: normal; widows: auto; word-spacing: 0px; = -webkit-text-stroke-width: 0px;" class=3D"">Rafael Marin Lopez, = PhD
Dept. Information and Communications Engineering = (DIIC)
Faculty of Computer Science-University of = Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: = +34868884151 e-mail: rafa@um.es
-------------------------------------------------------<= br style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; = font-variant: normal; font-weight: normal; letter-spacing: normal; = orphans: auto; text-align: start; text-indent: 0px; text-transform: = none; white-space: normal; widows: auto; word-spacing: 0px; = -webkit-text-stroke-width: 0px;" class=3D"">



_______________________________________________
sdn mailing list
sdn@irtf.org
https://www.irtf.org/mailman/listinfo/sdn



-----------------------------------------------------------
Gabriel L=C3=B3pez Mill=C3=A1n
Departamento de = Ingenier=C3=ADa de la Informaci=C3=B3n y las Comunicaciones
University of Murcia
Spain
Tel: = +34 868888504
Fax: +34 868884151
email: gabilm@um.es




= --Apple-Mail=_664D6299-A7F6-471E-BB19-9000CF52641F-- --Apple-Mail=_90DCC732-93F9-47FD-93EC-1E1737200F88 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQEcBAEBCAAGBQJWKJ70AAoJEMUYqoSNEZFT11UIAKOJAiQgCTSM/NHgOiEkEVtf DDDsLZGYvkBc8QY9nKPw7s4k5vllmP01sQ0kFr31g1AT0ZCBsmzS60GBAayvWeVm TWueyqHrSRbjNKeaTh7F1GmfnxeGs9QWRLcNBNxd63bNuwumTUisKZOJw8v+h3/w 9ePR+GHzXDMOT+F5J8eWJM/IVjkDIJuXAgGozv+jVjvlmRITE6iha8YzqpUH7mPY lj/ZxZ/eeiKC7aBSfwEeQ/HXzDXxdihTsG6pJl006VHowpzkXCddqgJS9k0A3nJr AgQrxryfmEz2y/U30eWQQFlVbXfQiirXmz0cGL7FKLIDHcsP+WecQVW+MclzU2w= =ihk4 -----END PGP SIGNATURE----- --Apple-Mail=_90DCC732-93F9-47FD-93EC-1E1737200F88-- From nobody Mon Oct 26 15:54:44 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D4F81B30D6 for ; Thu, 22 Oct 2015 19:20:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.45 X-Spam-Level: X-Spam-Status: No, score=0.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z1BW2fjRFFcF for ; Thu, 22 Oct 2015 19:20:26 -0700 (PDT) Received: from out4133-66.mail.aliyun.com (out4133-66.mail.aliyun.com [42.120.133.66]) by ietfa.amsl.com (Postfix) with ESMTP id 004DA1B30D4 for ; Thu, 22 Oct 2015 19:20:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1445566822; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=r8WQyns2bnbJ+p0agSZb8yf1O0fNryBYJqAVcSUymlw=; b=iO0okHje1yNv1YYFcp3wAAx/RBWQDISxFFpiHSmaNwQaFD3wzC8O2WNb7agNGPCXIg6zamVtOx4yAzD8SMMCeIi7VauDwNlFLZuTadZOAsncjN7br38ht7DE/wLGtK13gxjv3MGBabR7bYEoiD/Bfo3Sp9je5wkLWlPK9wAp8I8= X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R151e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03282; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=8; SR=0; Received: from 10.62.53.193(mailfrom:dacheng.zdc@alibaba-inc.com ip:182.92.253.23) by smtp.aliyun-inc.com(127.0.0.1); Fri, 23 Oct 2015 10:20:17 +0800 User-Agent: Microsoft-MacOutlook/14.5.7.151005 Date: Fri, 23 Oct 2015 10:20:14 +0800 From: "Dacheng Zhang" To: Rafa Marin Lopez , Linda Dunbar Message-ID: Thread-Topic: [I2nsf] [Sdn] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="GB2312" Content-transfer-encoding: quoted-printable Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:37 -0700 Cc: Sam Hartman , "sdn@irtf.org" , Alejandro Abad UM , "i2nsf@ietf.org" , Gabriel Lopez , Mahesh Jethanandani Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 02:20:30 -0000 Hi,=20 Maybe this work is not really considered in the current agenda. But I think it is very interesting. Also, I am thinking whether the similar idea can be used to mange the policies of securing routing protocols. We used to specify a key table specification for different routing protocols. At that time, someone mentioned it could be a good idea to use controllers to deploy keys for routing protocols, so that we don=A1=AFt have to extend IKEv2 to negotiate them.=20 Thoughts? Cheers Dacheng =D4=DA 15-10-23 =C9=CF=CE=E75:54=A3=AC "I2nsf on behalf of Rafa Marin Lopez" =D0=B4=C8=EB: >Hi Linda: > >> El 22 oct 2015, a las 22:06, Linda Dunbar >>escribi=A8=AE: >>=20 >> Rafa and Gabi, >> =20 >> Thank you very much for the explanation. That is very helpful. >> =20 >> Based on your explanation, the Capability Layer interface for IPSec >>has been defined > >If you are referring to the YANG model with IPsec then we have a good >step with draft-wang-ipsecme-ipsec-yang > >> but there is need for the Service Layer rules for IPSec. The service >>layer IPSec rules can be applied to many pairs of IPsec tunnels, so that >>administrators don=A1=AFt need to manually setup each one. Is my >>understanding correct? > >Right, that is also our understanding. > >> =20 >> Is it true that the IKE policies can be utilized between Security >>Controller and Client for the Service Layer interface? > >Yes, that might be a possibility, though we understand a deeper analysis >is required. > >Best Regards. > >> =20 >> Thanks, Linda >> =20 >> From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Gabriel Lopez >> Sent: Thursday, October 22, 2015 3:32 AM >> To: Rafa Marin Lopez >> Cc: i2nsf@ietf.org; sdn@irtf.org; Alejandro Abad UM; Linda Dunbar >> Subject: Re: [I2nsf] [Sdn] New update of >>draft-abad-sdnrg-sdn-ipsec-flow-protection >> =20 >> =20 >> Hi, >> =20 >> Thanks for the review. >> =20 >> Please, note that the draft also include IKE policies. >> =20 >> As described in Rafa=A1=AFs response, IKE allows two peers to dynamically >>negotiate the cryptography material for IPSec in a secure way. >> An example of IKE policies could be: >> =20 >> ike { >> proposal proposal-1 { >> authentication-method pre-shared-keys; >> dh-group group1; >> authentication-algorithm sha1; >> encryption-algorithm 3des-cbc; >> lifetime-seconds 1000; >> } >> proposal proposal-2 { >> authentication-method pre-shared-keys; >> dh-group group2; >> authentication-algorithm md5; >> encryption-algorithm des-cbc; >> lifetime-seconds 10000; >> } >> =20 >> Best regards, Gabi. >> =20 >> =20 >> El 22 oct 2015, a las 10:19, Rafa Marin Lopez escribi=A8=AE: >> =20 >> Dear Linda: >>=20 >> First of all, thanks for commenting on our draft. >>=20 >>=20 >> El 22 oct 2015, a las 0:43, Linda Dunbar >>escribi=A8=AE: >>=20 >> Rafa,=20 >>=20 >> Thank you very much for sharing the draft. >>=20 >> Can you elaborate what kind of IPSec policies that Apps can give to >>"SDN Controller=A1=B1? >> I am not an expert on IPSec, so pardon me if my question is not >>correct: if client needs "protected IPsec traffic", can them simply >>establish two parallel IPSec tunnels? >>=20 >> Any question is good. So, thank you. Let me try to clarify. When you >>want to establish an IPsec protected tunnel you have to configure >>rules/policies to determine what kind of traffic you want to protect. >>=20 >> Imagine you have* : >>=20 >> Network A(172.16.1.0/24) =A1=AA GW_A >>(192.168.1.100/24)-Internet-(192.168.2.100/24) GW_B - (172.16.2.0/24) >>Network_B >>=20 >> With ipsec-tools in Linux you define the following policies to protect >>traffic between both networks with a tunnel. Administrators of both >>networks have to configure this in both GW_A and GW_B : >>=20 >> spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec >> esp/tunnel/192.168.1.100-192.168.2.100/require; >>=20 >> spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec >> esp/tunnel/192.168.2.100-192.168.1.100/require; >>=20 >> *See the detailed example in Fig. 5 in >>http://www.ipsec-howto.org/x304.html >>=20 >> Moreover it has to specify other parameters such as credentials to be >>used to establish IKE SA, cryptographic algorithms etc=A1=AD >>=20 >>=20 >>=20 >> What is your goal? Only to give use cases for IPSec policy? >>=20 >> Our goal is to automatize the management of IPsec security associations >>so that administrators do not have add those rules in each device. The >>general idea stemmed from the following principle: >>=20 >> To establish an IPsec security association you run first IKE to >>negotiate the IPsec SA (control plane). Once it is established some >>parameters are configured in the kernel of the network devices, so they >>can process the IP packets with IPsec before forwarding (data plane). So >>for us, there is a clear separation between these two planes. >>=20 >> Additionally, please think that IPsec uses packet filtering (and >>cryptography). In this sense we consider that a NSF can perform this >>task. Thus, some interface as those to be defined in I2NSF may be >>required. Btw, you can find a YANG model for ipsec in the following link: >>=20 >> https://tools.ietf.org/html/draft-tran-ipecme-yang-ipsec-00 >>=20 >>=20 >>=20 >> Or do you plan to dive in one step further to define the semantics of >>the polices or rules for IPSec? >>=20 >> If I understand correctly your question I will say the semantics and >>rules for IPsec are already there as shown in the example. Another thing >>to consider is to define through an application a more general rule such >>as =A1=B0I want to protect traffic against eavesdropping between these two >>networks" that is finally translated in more specific IPsec policies >>=20 >> We hope this clarify your doubts. In any case, if you have any other >>question do not hesitate to ask. >>=20 >> Best Regards. >>=20 >>=20 >> Thanks, Linda=20 >>=20 >> -----Original Message----- >> From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Rafa Marin >>Lopez >> Sent: Wednesday, October 21, 2015 4:15 AM >> To: sdn@irtf.org; i2nsf@ietf.org >> Cc: Gabriel Lopez; Alejandro Abad UM; Rafa Marin Lopez >> Subject: [I2nsf] New update of >>draft-abad-sdnrg-sdn-ipsec-flow-protection >>=20 >> Dear all: >>=20 >> You may find a new update about Software-Defined Networking (SDN)-based >>IPsec Flow Protection in this link: >>=20 >>=20 >>https://tools.ietf.org/id/draft-abad-sdnrg-sdn-ipsec-flow-protection-01.t >>xt >>=20 >> We have added some minor modifications and a section to explain the >>relationship with I2NSF work. >>=20 >> Comments are really welcome. >>=20 >> Best Regards. >>=20 >> ------------------------------------------------------- >> Rafael Marin Lopez, PhD >> Dept. Information and Communications Engineering (DIIC) Faculty of >>Computer Science-University of Murcia >> 30100 Murcia - Spain >> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >> ------------------------------------------------------- >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> I2nsf mailing list >> I2nsf@ietf.org >> https://www.ietf.org/mailman/listinfo/i2nsf >>=20 >> ------------------------------------------------------- >> Rafael Marin Lopez, PhD >> Dept. Information and Communications Engineering (DIIC) >> Faculty of Computer Science-University of Murcia >> 30100 Murcia - Spain >> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >> ------------------------------------------------------- >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> sdn mailing list >> sdn@irtf.org >> https://www.irtf.org/mailman/listinfo/sdn >> =20 >> =20 >>=20 >> ----------------------------------------------------------- >> Gabriel L=A8=AEpez Mill=A8=A2n >> Departamento de Ingenier=A8=AAa de la Informaci=A8=AEn y las Comunicaciones >> University of Murcia >> Spain >> Tel: +34 868888504 >> Fax: +34 868884151 >> email: gabilm@um.es > >------------------------------------------------------- >Rafael Marin Lopez, PhD >Dept. Information and Communications Engineering (DIIC) >Faculty of Computer Science-University of Murcia >30100 Murcia - Spain >Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es >------------------------------------------------------- > > > > >_______________________________________________ >I2nsf mailing list >I2nsf@ietf.org >https://www.ietf.org/mailman/listinfo/i2nsf From nobody Mon Oct 26 15:54:45 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96D051A047A for ; Fri, 23 Oct 2015 07:15:01 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mr-RfODFmgzs for ; Fri, 23 Oct 2015 07:14:59 -0700 (PDT) Received: from xenon21.um.es (xenon21.um.es [155.54.212.161]) by ietfa.amsl.com (Postfix) with ESMTP id B3A001A0368 for ; Fri, 23 Oct 2015 07:14:59 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon21.um.es (Postfix) with ESMTP id 8747040551; Fri, 23 Oct 2015 16:14:57 +0200 (CEST) X-Virus-Scanned: by antispam in UMU at xenon21.um.es Received: from xenon21.um.es ([127.0.0.1]) by localhost (xenon21.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id rJAdXZ8sKSrW; Fri, 23 Oct 2015 16:14:57 +0200 (CEST) Received: from inf-205-216.inf.um.es (inf-205-216.inf.um.es [155.54.205.216]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon21.um.es (Postfix) with ESMTPSA id C25C640550; Fri, 23 Oct 2015 16:14:49 +0200 (CEST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Rafa Marin Lopez In-Reply-To: Date: Fri, 23 Oct 2015 16:14:47 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> To: Sam Hartman X-Mailer: Apple Mail (2.3094) Archived-At: X-Mailman-Approved-At: Mon, 26 Oct 2015 15:54:37 -0700 Cc: "sdn@irtf.org" , mark@painless-security.com, Alejandro Abad UM , "i2nsf@ietf.org" , Gabriel Lopez , Linda Dunbar , margaret@painless-security.com, Rafa Marin Lopez , Mahesh Jethanandani , Dacheng Zhang Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 14:15:01 -0000 Hi Sam: Thanks for your interest in the document. Unfortunately we won=E2=80=99t = go this time. In any case we can prepare a call to discuss if you want.=20= Definitely one of the possible tasks of the security controller may be = key distribution, which is, in our opinion, very interesting. Best Regards > El 23 oct 2015, a las 15:45, Sam Hartman = escribi=C3=B3: >=20 > This does seem interesting even if if beyond the scope of I2NSF. > Are you going to be in Japan? > I will not, but margaret and Mark from Painless Security will be. ------------------------------------------------------- Rafael Marin Lopez, PhD Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia 30100 Murcia - Spain Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es ------------------------------------------------------- From nobody Tue Oct 27 03:52:44 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C97041A802A for ; Tue, 27 Oct 2015 03:52:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hr3WFiBZaSgU for ; Tue, 27 Oct 2015 03:52:40 -0700 (PDT) Received: from xenon21.um.es (xenon21.um.es [155.54.212.161]) by ietfa.amsl.com (Postfix) with ESMTP id 04CE51A8029 for ; Tue, 27 Oct 2015 03:52:40 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by xenon21.um.es (Postfix) with ESMTP id A535A40958; Tue, 27 Oct 2015 11:52:37 +0100 (CET) X-Virus-Scanned: by antispam in UMU at xenon21.um.es Received: from xenon21.um.es ([127.0.0.1]) by localhost (xenon21.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 9ARRyStC+wuc; Tue, 27 Oct 2015 11:52:37 +0100 (CET) Received: from [192.168.1.3] (16.Red-83-37-40.dynamicIP.rima-tde.net [83.37.40.16]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: gabilm) by xenon21.um.es (Postfix) with ESMTPSA id 2470840957; Tue, 27 Oct 2015 11:52:35 +0100 (CET) Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) Content-Type: multipart/signed; boundary="Apple-Mail=_4B23262E-999B-45FA-93AC-B1E2818677B6"; protocol="application/pgp-signature"; micalg=pgp-sha256 X-Pgp-Agent: GPGMail 2.6b2 From: Gabriel Lopez In-Reply-To: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> Date: Tue, 27 Oct 2015 11:52:33 +0100 Message-Id: <78A5E885-37C0-432D-B6DD-4D07B3F2F6DD@um.es> References: <65174429B5AF4C45BD0798810EC48E0A32489A0B@EX-0-MB2.lancs.local> To: "King, Daniel" X-Mailer: Apple Mail (2.3094) Archived-At: Cc: "sdn@irtf.org" Subject: Re: [Sdn] ONF Liaison to IRTF: Publication of ONF TR-518, Relationship of SDN and NFV X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Oct 2015 10:52:42 -0000 --Apple-Mail=_4B23262E-999B-45FA-93AC-B1E2818677B6 Content-Type: multipart/alternative; boundary="Apple-Mail=_1F65C102-147C-494C-8C7D-A00433DDF2C8" --Apple-Mail=_1F65C102-147C-494C-8C7D-A00433DDF2C8 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi, I get an Error 404 in the url. You can try this one: = https://www.opennetworking.org/images/stories/downloads/sdn-resources/tech= nical-reports/onf2015.310_Architectural_comparison.08-2.pdf = Regards, Gabi. > El 16 oct 2015, a las 22:56, King, Daniel = escribi=C3=B3: >=20 > Hi SDN Researchers, >=20 > You may be interested in a recent ONF Liaison regarding a recent ONF = publication (TR-518 "Relationship of SDN and NFV"). The liaison = information and link to the public document is detailed below. >=20 >>>=20 > Dear colleagues, >=20 > This is to inform you of the publication of ONF Technical = Recommendation TR-518, entitled > Relationship of SDN and NFV. It offers perspectives on ways in which = SDN and NFV complement > and strengthen each other, and especially encourages the avoidance of = silos between SDN and > NFV. >=20 > The released document is available at: = https://www.opennetworking.org/images/stories/downloads/sdn-resources/tech= nicalreports/onf2015.310_Architectural_comparison.08-2.pdf = >=20 > We invite and encourage you to make use of it in your further = consideration of related topics. > << >=20 > BR, Dan. > _______________________________________________ > sdn mailing list > sdn@irtf.org > https://www.irtf.org/mailman/listinfo/sdn ----------------------------------------------------------- Gabriel L=C3=B3pez Mill=C3=A1n Departamento de Ingenier=C3=ADa de la Informaci=C3=B3n y las = Comunicaciones University of Murcia Spain Tel: +34 868888504 Fax: +34 868884151 email: gabilm@um.es --Apple-Mail=_1F65C102-147C-494C-8C7D-A00433DDF2C8 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8

Hi, 



Regards, = Gabi.



El 16 oct 2015, a las 22:56, King, Daniel = <d.king@lancaster.ac.uk> escribi=C3=B3:

Hi = SDN Researchers,

You may be interested in a = recent ONF Liaison regarding a recent ONF publication (TR-518 = "Relationship of SDN and NFV").  The liaison information and link = to the public document is detailed below.


Dear colleagues,

This is to inform you of the publication of = ONF Technical Recommendation TR-518, entitled
Relationship = of SDN and NFV. It offers perspectives on ways in which SDN and NFV = complement
and strengthen each other, and especially = encourages the avoidance of silos between SDN and
NFV.

The released document is available at: https://www.opennetworking.org/images/stories/downloads/sdn-res= ources/technicalreports/onf2015.310_Architectural_comparison.08-2.pdf<= br class=3D"">




We invite and = encourage you to make use of it in your further consideration of related = topics.
<<

BR, Dan.
<winmail.dat>= _______________________________________________
sdn = mailing list
sdn@irtf.org
https://www.irtf.org/mailman/listinfo/sdn



-----------------------------------------------------------
Gabriel L=C3=B3pez Mill=C3=A1n
Departamento de = Ingenier=C3=ADa de la Informaci=C3=B3n y las Comunicaciones
University of Murcia
Spain
Tel: = +34 868888504
Fax: +34 868884151
email: gabilm@um.es




= --Apple-Mail=_1F65C102-147C-494C-8C7D-A00433DDF2C8-- --Apple-Mail=_4B23262E-999B-45FA-93AC-B1E2818677B6 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQEcBAEBCAAGBQJWL1dyAAoJEMUYqoSNEZFTYLwH+gIcOpLkGkziT/QSl4z5EsdB PGk5+JvJ0th+BOpF33gVHbgx582gEJ4DvOZAvYZJRp96hTZwAiCDNbmqZGCICjYg z9AzDFkLA6zNEdw/XO6JAMnNoS1/j8XkCYXHeKisOmgHb8glqzoUfKLmihAeMQc1 4KemTRbKKlXkpaVix+Ia34kCwMInU7fPeKthtKzZRJk358o8h/EK9HkrGmMg6XHs ne0Moov1wrwuN8mL5mW5BGj/1MLKam10cMIXf5KFdFPUD9cl0rjY+RzgnSa1UVfT OQK1UrcHvYwpJcZ41hflthP7DGgMOYD1k2+bNgwGLu85xkaE2SzhRUreLmeuOJw= =wVW3 -----END PGP SIGNATURE----- --Apple-Mail=_4B23262E-999B-45FA-93AC-B1E2818677B6-- From nobody Tue Oct 27 04:12:56 2015 Return-Path: X-Original-To: sdn@ietfa.amsl.com Delivered-To: sdn@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFD371B32A6 for ; Mon, 26 Oct 2015 18:42:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.451 X-Spam-Level: X-Spam-Status: No, score=0.451 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=unavailable Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9xNuRdbvSkNz for ; Mon, 26 Oct 2015 18:42:30 -0700 (PDT) Received: from out4133-50.mail.aliyun.com (out4133-50.mail.aliyun.com [42.120.133.50]) by ietfa.amsl.com (Postfix) with ESMTP id 92DBA1B32A4 for ; Mon, 26 Oct 2015 18:42:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1445910148; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=TLpO0sm+IKsUsGCsH+NbYZaGQN+m66vgHoL85AyhZkk=; b=KCfu2VVBYpoVKhKwI1LkhsJ9mz1P6ND9P3zoXMdfPflMITOY+LpyFi1JUHg+GD/wVY/8+jsM+dObhAT4a1PDRSU8Jia/QqUJaSIGSGyRudvsxTSfzvybITq8gmEeWue/x/j3inh1+r5RkM6TjlF9G3SNr+bmvn3NGle/TLZWUM0= X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R131e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03273; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=11; SR=0; Received: from 10.62.55.32(mailfrom:dacheng.zdc@alibaba-inc.com ip:182.92.253.23) by smtp.aliyun-inc.com(127.0.0.1); Tue, 27 Oct 2015 09:42:22 +0800 User-Agent: Microsoft-MacOutlook/14.5.7.151005 Date: Tue, 27 Oct 2015 09:42:17 +0800 From: "Dacheng Zhang" To: Sam Hartman , Gabriel Lopez , Mingui Zhang Message-ID: Thread-Topic: [I2nsf] [Sdn] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection References: <4A95BA014132FF49AE685FAB4B9F17F657D71571@dfweml701-chm> <89725C38-5C24-44B2-9957-BAD267993F92@um.es> <160732AF-02A9-48FB-BF91-94412A1688C0@um.es> <4A95BA014132FF49AE685FAB4B9F17F657D7208A@dfweml701-chm> In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="GB2312" Content-transfer-encoding: quoted-printable Archived-At: X-Mailman-Approved-At: Tue, 27 Oct 2015 04:12:55 -0700 Cc: "sdn@irtf.org" , mark@painless-security.com, Alejandro Abad UM , "i2nsf@ietf.org" , Linda Dunbar , margaret@painless-security.com, Rafa Marin Lopez , Mahesh Jethanandani Subject: Re: [Sdn] [I2nsf] New update of draft-abad-sdnrg-sdn-ipsec-flow-protection X-BeenThere: sdn@irtf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List to Discuss SDN Research Group in the IRTF List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Oct 2015 01:42:30 -0000 I will not go to Japan this time. But I plan to attend the next IETF meeting. Linda plans to visit China before the meeting=A3=AC so I will try to get a chance to discuss with her about this. I think my friends from Huawei may be also interested in this topic. ^_^ =D4=DA 15-10-23 =CF=C2=CE=E79:45=A3=AC "Sam Hartman" =D0=B4=C8=EB: >This does seem interesting even if if beyond the scope of I2NSF. >Are you going to be in Japan? >I will not, but margaret and Mark from Painless Security will be.