From nobody Mon Feb 4 02:30:13 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C6C9130E3F for ; Mon, 4 Feb 2019 02:30:11 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.889 X-Spam-Level: X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_REMOTE_IMAGE=0.01] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=x-works-io.20150623.gappssmtp.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TOOOLlyUinEh for ; Mon, 4 Feb 2019 02:29:57 -0800 (PST) Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AF18130DE7 for ; Mon, 4 Feb 2019 02:29:52 -0800 (PST) Received: by mail-wr1-x42a.google.com with SMTP id a16so8184525wrv.0 for ; Mon, 04 Feb 2019 02:29:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=x-works-io.20150623.gappssmtp.com; s=20150623; h=from:subject:to:message-id:date:user-agent:mime-version :content-language; bh=gi18EnccZn2pPtLEMMJtRuKt+9NIykb7oDNQ+P9DzR4=; b=CIRG+7f+M03tDENl2GCnDGMHDTLxJ2RSWKTstOFlU5oWDJkYb5boPkYZXaWFP+XGiU nxV3Tc2HZixcQa4zCRBshACDPVZ+LktxRc3eQs7okncsOOnLX98rAowMssaDhQdcQk2s luhGs0vn8+/PVGCeNf4BLqC0lmBNXcMkgyTHF19JKpitb1zk9N71zZKOe+rdlgQZ7b7N HJ3ZIyETdfsOvdpn3XFdh+GmACKwpfm38QJrXHprzthMHi0edXYGA8/hJTGZyY10oemT zv1nyOVSDDJlClB5nBOuS5hDpT7gNfrMPEVcEtQF075JeqN8vjegLq27URNvB4Rksacm d65g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:message-id:date:user-agent :mime-version:content-language; bh=gi18EnccZn2pPtLEMMJtRuKt+9NIykb7oDNQ+P9DzR4=; b=uZp+00Wm4USrUvse9pvPrbm6becRV7wOSd9urWvOnssoIWUeHxKJ6Rv9fIUIwvkxxE WT/ROTbHz6j/ApulH5J34Oy4Wfq5h8LvIoHYNm7lq9aDWN8IX3hDbLboSag/kflulNsG kHmIXMgPU1FPLPYxtgi//WzFeBjrwnPx9guTDU2QX09Y+zjtoeXWgVzipA1PAKT+Mgxb 1TeMdPGri8TvFvAPVgEFkgwf10Tm/d9NLjzgtBcGfMwlCFgLdXLl22KjxlYDE4e1zePk bpPxdnAWoj5U/k11zMrpRxiEek8yPQqNlVD6dNrgHqcnkG08lCsPho5kUtp01GbO1W48 st/g== X-Gm-Message-State: AJcUukcmfUpt1nVtPzYVGWyMkBFDvZJegAbUyoaza6ICTasktWIST1FI d433YPGZ4c+1BIR1qaMWqsOG9OB3RwXwfA== X-Google-Smtp-Source: ALg8bN4NEgUxlnoGaR1aLQno2djqGMjetXcYi1OgHVEzBpKN0espNS73HvKWy6mPuvAGfkkJfEEkSg== X-Received: by 2002:adf:ee07:: with SMTP id y7mr50306723wrn.187.1549276190410; Mon, 04 Feb 2019 02:29:50 -0800 (PST) Received: from [192.168.0.18] ([195.28.94.38]) by smtp.gmail.com with ESMTPSA id f199sm12559936wmd.25.2019.02.04.02.29.49 for (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 04 Feb 2019 02:29:49 -0800 (PST) From: Boris Pilka To: hackathon@ietf.org Message-ID: Date: Mon, 4 Feb 2019 11:29:48 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="------------46A63AEE69D1637CC8C695C9" Content-Language: en-US X-Antivirus: Avast (VPS 190203-4, 02/03/2019), Outbound message X-Antivirus-Status: Clean Archived-At: Subject: [hackathon] DTN - Bundle protocol agent X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 Feb 2019 10:30:11 -0000 This is a multi-part message in MIME format. --------------46A63AEE69D1637CC8C695C9 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Hello all, below is a brief summary of what we would like to do on the upcoming IETF 104 Hackathon. If you find the project interesting, please, join us! Kind regards, Boris ================================= Enhancements of pyDTN What is pyDTN ?   - proof of concept (POC) implementation of Bundle protocol agent in python3. Most of the integration work was done on 101th IETF's Hackathon. What it does/doesn't do ?   - able to receive and decode bundle (Bundle Protocol Version 7, https://tools.ietf.org/html/draft-ietf-dtn-bpbis-10)   - uses TCP-based convergence layer for Delay-Tolerant Networking (DTN) - Delay-Tolerant Networking TCP Convergence-Layer Protocol(https://tools.ietf.org/html/rfc7242)       - partial implementation - sending/receiving of contact headers   - provides REST APIs for configuration of uPCN :       - send bundle       - schedule contact   - partial implementation of DTN IP Neighbor Discovery (IPND) (https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03)       - code able to send/receive beacon is present, however it is not integrated to daemon Goals for hackathon:     - enhance implementation of TCP-based convergence layer     - incorporate DTN IP Neighbor Discovery     - any other enhancements are welcomed, will largely depend on size of the team --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus --------------46A63AEE69D1637CC8C695C9 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit

Hello all,

below is a brief summary of what we would like to do on the upcoming IETF 104 Hackathon. If you find the project interesting, please, join us!

Kind regards,

Boris
=================================

Enhancements of pyDTN
 
What is pyDTN ?
  - proof of concept (POC) implementation of Bundle protocol agent in python3. Most of the integration work was done on 101th IETF's Hackathon.
 
What it does/doesn't do ?
  - able to receive and decode bundle (Bundle Protocol Version 7, https://tools.ietf.org/html/draft-ietf-dtn-bpbis-10)

  - uses TCP-based convergence layer for Delay-Tolerant Networking (DTN) - Delay-Tolerant Networking TCP Convergence-Layer Protocol(https://tools.ietf.org/html/rfc7242)
      - partial implementation - sending/receiving of contact headers

  - provides REST APIs for configuration of uPCN :
      - send bundle
      - schedule contact

  - partial implementation of DTN IP Neighbor Discovery (IPND) (https://tools.ietf.org/html/draft-irtf-dtnrg-ipnd-03)
      - code able to send/receive beacon is present, however it is not integrated to daemon

Goals for hackathon:
    - enhance implementation of TCP-based convergence layer
    - incorporate DTN IP Neighbor Discovery
    - any other enhancements are welcomed, will largely depend on size of the team

    

Virus-free. www.avast.com
--------------46A63AEE69D1637CC8C695C9-- From nobody Tue Feb 19 09:01:20 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B503D130F2A for ; Tue, 19 Feb 2019 09:01:18 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.501 X-Spam-Level: X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xm7c_NQS6eCH for ; Tue, 19 Feb 2019 09:01:16 -0800 (PST) Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B556130F29 for ; Tue, 19 Feb 2019 09:01:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4233; q=dns/txt; s=iport; t=1550595676; x=1551805276; h=from:to:subject:date:message-id:mime-version; bh=PYCOzgd8Mc4837OH2Ea9AG/aFDyoKmDWRGHQBnroBUg=; b=l7/COdxwVcyRt1eSLcjc9hgee1/Ehe/26pVreLoT1H9VASTAjDF34NxL AEqwQI3tJcQ2qpuPHwP0C/zuoZvYWD6D2Q+07E6qnvLCxmKKeZmPyB51y er2rBuMx3Y1JkjBvJL9UEanOLYx3bzhAvd1yr0U6G2bg32meJ6Qs8qcVj c=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BwAAA6NWxc/5xdJa1jHAEBAQQBAQc?= =?us-ascii?q?EAQGBUwUBAQsBgQ1MKmeBAzGYBZQ3hXGBewsBAYF3hmIiNgcNAQMBAQIBAQJ?= =?us-ascii?q?tHQuFfjsjAQx0HwcBBBuCT0qBDmSvB4ouhXqGSheBQD+PBAKKEQOGGocXjAQ?= =?us-ascii?q?JAoZ1i1ohkwSKRZF+AhEUgScmCCmBVnAVgyiQXEGMdYEfAQE?= X-IronPort-AV: E=Sophos;i="5.58,388,1544486400"; d="scan'208,217";a="521263258" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:00:51 +0000 Received: from XCH-RCD-013.cisco.com (xch-rcd-013.cisco.com [173.37.102.23]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x1JH0pxs028935 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for ; Tue, 19 Feb 2019 17:00:51 GMT Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-RCD-013.cisco.com (173.37.102.23) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:00:50 -0600 Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1395.000; Tue, 19 Feb 2019 11:00:50 -0600 From: "Philip Perricone (phperric)" To: "hackathon@ietf.org" Thread-Topic: question about hackathon cost Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQ== Date: Tue, 19 Feb 2019 17:00:50 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.82.234.134] Content-Type: multipart/alternative; boundary="_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_" MIME-Version: 1.0 X-Outbound-SMTP-Client: 173.37.102.23, xch-rcd-013.cisco.com X-Outbound-Node: rcdn-core-5.cisco.com Archived-At: Subject: [hackathon] question about hackathon cost X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 17:01:19 -0000 --_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hello, I have a questions related to the upcoming IETF 104 Hackathon. On the IETF website, it says "IETF Hackathons are free to attend and open t= o everyone". It seems obvious, but could anyone with experience here confirm that regist= ration (and payment) for the overall IETF conference is NOT necessary to attend/participate in the Hackathon event? In other words, the Hackathon truly is "free and open"? I want to make sure that I understand correctly. Thanks! Philip Perricone Cisco Systems, Inc. Software Engineer Security & Trust Organization Research Triangle Park, NC --_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hello,

 

I have a questions related to the upcoming IETF 104 = Hackathon.

 

On the IETF website, it says “IETF Hackathons = are free to attend and open to everyone”.

It seems obvious, but could anyone with experience h= ere confirm that registration (and payment) for the overall IETF conference=

is NOT necessary to attend/participate in the Hackat= hon event?

 

In other words, the Hackathon truly is “free a= nd open”?

I want to make sure that I understand correctly.

 

Thanks!

 

Philip Perricone

Cisco Systems, Inc.=

Software Engineer

Security & Trust Org= anization

Research Triangle Park, = NC

 

--_000_b079a026857c40459fdd2be0ba10f41fXCHALN013ciscocom_-- From nobody Tue Feb 19 09:10:59 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 433C3130F2C for ; Tue, 19 Feb 2019 09:10:57 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ID-EYMvoP3HB for ; Tue, 19 Feb 2019 09:10:54 -0800 (PST) Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87760130F27 for ; Tue, 19 Feb 2019 09:10:54 -0800 (PST) Received: from pps.filterd (m0049459.ppops.net [127.0.0.1]) by m0049459.ppops.net-00191d01. (8.16.0.27/8.16.0.27) with SMTP id x1JH6lig036448; Tue, 19 Feb 2019 12:10:53 -0500 Received: from tlpd255.enaf.dadc.sbc.com (sbcsmtp3.sbc.com [144.160.112.28]) by m0049459.ppops.net-00191d01. with ESMTP id 2qrnpg0hh2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 19 Feb 2019 12:10:52 -0500 Received: from enaf.dadc.sbc.com (localhost [127.0.0.1]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAput069099; Tue, 19 Feb 2019 11:10:52 -0600 Received: from zlp30499.vci.att.com (zlp30499.vci.att.com [135.46.181.149]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAmEM069019; Tue, 19 Feb 2019 11:10:48 -0600 Received: from zlp30499.vci.att.com (zlp30499.vci.att.com [127.0.0.1]) by zlp30499.vci.att.com (Service) with ESMTP id DACD94013B46; Tue, 19 Feb 2019 17:10:48 +0000 (GMT) Received: from clpi183.sldc.sbc.com (unknown [135.41.1.46]) by zlp30499.vci.att.com (Service) with ESMTP id B9FA44013B47; Tue, 19 Feb 2019 17:10:48 +0000 (GMT) Received: from sldc.sbc.com (localhost [127.0.0.1]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAmR9021646; Tue, 19 Feb 2019 11:10:48 -0600 Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.255.15]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id x1JHAeZS021232; Tue, 19 Feb 2019 11:10:40 -0600 Received: from exchange.research.att.com (njbdcas1.research.att.com [135.197.255.61]) by mail-green.research.att.com (Postfix) with ESMTP id E66B9E41EB; Tue, 19 Feb 2019 12:10:05 -0500 (EST) Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njbdcas1.research.att.com ([fe80::8c6b:4b77:618f:9a01%11]) with mapi id 14.03.0439.000; Tue, 19 Feb 2019 12:10:39 -0500 From: "MORTON, ALFRED C (AL)" To: "Philip Perricone (phperric)" , "hackathon@ietf.org" Thread-Topic: question about hackathon cost Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQAASyEA Date: Tue, 19 Feb 2019 17:10:16 +0000 Message-ID: <4D7F4AD313D3FC43A053B309F97543CF6BFFAA3F@njmtexg5.research.att.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [135.16.251.151] Content-Type: multipart/alternative; boundary="_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_" MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-02-19_11:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=751 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902190126 Archived-At: Subject: Re: [hackathon] question about hackathon cost X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 17:10:57 -0000 --_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Yes, free and open is quite correct for the hackathon-only, no IETF registration is required, Philip. Al From: hackathon [mailto:hackathon-bounces@ietf.org] On Behalf Of Philip Per= ricone (phperric) Sent: Tuesday, February 19, 2019 12:01 PM To: hackathon@ietf.org Subject: [hackathon] question about hackathon cost Hello, I have a questions related to the upcoming IETF 104 Hackathon. On the IETF website, it says "IETF Hackathons are free to attend and open t= o everyone". It seems obvious, but could anyone with experience here confirm that regist= ration (and payment) for the overall IETF conference is NOT necessary to attend/participate in the Hackathon event? In other words, the Hackathon truly is "free and open"? I want to make sure that I understand correctly. Thanks! Philip Perricone Cisco Systems, Inc. Software Engineer Security & Trust Organization Research Triangle Park, NC --_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Yes, free and open is quite correct for the hackathon-onl= y,

no IETF registration is required, Philip.

 

Al

 <= /p>

From: hackathon [mailto:hackathon-bounces@iet= f.org] On Behalf Of Philip Perricone (phperric)
Sent: Tuesday, February 19, 2019 12:01 PM
To: hackathon@ietf.org
Subject: [hackathon] question about hackathon cost

 

Hello,

 

I have a questions related to the upcoming IETF 104 = Hackathon.

 

On the IETF website, it says “IETF Hackathons = are free to attend and open to everyone”.

It seems obvious, but could anyone with experience h= ere confirm that registration (and payment) for the overall IETF conference=

is NOT necessary to attend/participate in the Hackat= hon event?

 

In other words, the Hackathon truly is “free a= nd open”?

I want to make sure that I understand correctly.

 

Thanks!

 

Philip Perricone

Cisco Systems, Inc.=

Software Engineer

Security & Trust Org= anization

Research Triangle Park, = NC

 

--_000_4D7F4AD313D3FC43A053B309F97543CF6BFFAA3Fnjmtexg5researc_-- From nobody Tue Feb 19 09:25:37 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D440B130F44 for ; Tue, 19 Feb 2019 09:25:35 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.502 X-Spam-Level: X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4CFbKGqv75eV for ; Tue, 19 Feb 2019 09:25:34 -0800 (PST) Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52BEA130F40 for ; Tue, 19 Feb 2019 09:25:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=127; q=dns/txt; s=iport; t=1550597134; x=1551806734; h=to:from:subject:message-id:date:mime-version: content-transfer-encoding; bh=zLlaij0lZ6g5hdvbKPupRPUxZ7jsCmiKwpMVla/53ZY=; b=mBH9OlMTou8NmZBy/0mAuiYyrfoUVOAmr5Ln4CtCvi2GA8dbfBipn5Bt JHHWqCu7zPg2KGqUREAT1V6LzOFvwtmRyOzL2E9NTvVJd1STkhRXioEwX DXST7MxZyyNibhRorCf02LwtoEkd/Aqbgw/BsNEtQVN+3qtZCbHkmeyLr U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AdAwDhOmxc/5xdJa1jHAEBAQQBAQc?= =?us-ascii?q?EAQGBZYIEgTcBMoQtlAmcIw2EYoN3IjgSAQMBAQIBAQJtHQuFdA8BewImAl8?= =?us-ascii?q?NCAEBgxyBc61ggS+KMIELhniEQReBQD+BOIp1glcCkVGReAmSUwYZgWEBkSK?= =?us-ascii?q?KRZIlgV0hKIEuMxoIGxWDKJB6IQOOEwEB?= X-IronPort-AV: E=Sophos;i="5.58,388,1544486400"; d="scan'208";a="510817505" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:25:32 +0000 Received: from dhcp-10-150-34-131.cisco.com (dhcp-10-150-34-131.cisco.com [10.150.34.131]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTP id x1JHPWKC029001 for ; Tue, 19 Feb 2019 17:25:32 GMT To: "hackathon@ietf.org" From: Peter Beal Openpgp: preference=signencrypt Autocrypt: addr=pbeal@cisco.com; prefer-encrypt=mutual; keydata= mQINBFXP0S8BEAC58SavuJHGtmMEd2SJvXdj3OKcFMLNUFamb7lJrFK4qxkBkFX23+H5aY4/ mn0g1ux8pGkktLggcnIinbevFwOSOMgVP6WYpTKhfRvN0DPslLKmypqcEWR+isFGafT51Pve J22JCvsyso+3PV3RwJn+jfnp7jwVE7ABElUFraeE7OrRVOMxlJEb0mqU09fZ14TpIj9zmSdy uqCkYST4Oy2UgXGBivHIg4aX5poOoP7EvWlCZyMymsSHNBjJPXnQLcrqTsrF66IGEJRIBWoh zg1IGPl50Dfv0W5zdKvfnsm6+0z5h9UAfVZrFnMGYnFRfZQrqleepOqrcaHIZhPchTuvMsPR duvxeVKeIsW6j41reMeAFSgTnHteiDE9SA+SSutNys49dYWZFQWotO9XzxDo4p3cDM6xt1hc hAx9rSTSAuH33yVwCUDb1l8H0aG05gp9Kf8nig/lq4mA+Ls3Nzkq3/H8VySR9Z/69ZtZSLSm zpUoGdZFyVuO9zYVLJgGslw8bJbARzQWZw715tfGbLouhrKwRX/qbnU68bSGJg0dPok1XTKN dQSaTQ+zgNzMUxfWjr7ST5ehpDW8scmB+gedimqc9YtmuDrke570XYLGNGIn8Pm6FO7kCh8N bIBDyhbKwsQlnt14ut/z5gL1a8sjnb3o+qVZSjXgjxlnqq8PsQARAQABtBxQZXRlciBCZWFs IDxwYmVhbEBjaXNjby5jb20+iQI9BBMBCgAnBQJVz9EvAhsDBQkHhh+ABQsJCAcDBRUKCQgL BRYCAwEAAh4BAheAAAoJEJ8J5d/C8fFUNb4P/jFaLHmFevaikD/eXwQIArRfY+NwBpGkSjBY YNlchlzxO0LCIp8yx8X8oWewqBFerNdf+TmWXzyb2ECaYmwRmCEpKid8iGFm2/1pf7V4GNpc L6uwCyJaZOUk+Q50n6REI1bj0NOJjXM35xMNWT2TRVmw3Bl3+8ce4VdxvabmSdtX8ZBzosq1 xjNYyrns9Unq7Xp+O82NUPOj/F0orsoc4q0mvPCCGlEYGS6KDWjhO7rNiRWtztm4IIsyWaJH eSvjhqtHu4g2/o6gRVrjBLHRHxGUMPX0e7WBlus6iXWt/jt18IU6LP7xZ3bJVGOjbuSHANDG 7fpOtZBAT2wAaXukB6CFWc5qEpGRnR435f9OKa8hc5pxxS+LZbCwWYCcfgIE421+Ce/PjsbM DnCijMmQlNPVsjZmI/h+eJPjYy7LlzBUJQKzFLBopr2oET8zvq6IuLgByVp/CxV11GV39A/g kE0yOOy8okyq4EsrcNHVZzQgYHFZKIQ4cQi8t19s2yckJHbLZKGdaTSbBAMmUfgNarXd2o/x hy7TpuhveJ9VFcXtyTUi8/HjxSR9B3Nwhc6+LTpe8/hpemyWvbmjp0HxwkLVheyjWSXTJib1 wgemB1tzTNJe0vZF8CK8p/d/cVwP81WAN7jjA/4Loj8XD+abPOroRAyhht7LSVErpwGRVqm6 uQINBFXP0S8BEADFFs4dxyoCzzloj9k0Po8GJmguFjB1ejZlnBXfniesrX7CshQf8p73NhLe FzrnGpq6vwoTN/PNa3iG2V+Xd2dzTaWOwxKIwD8uaoWS/M7eU024YuEBv3DJOkvmq3x+JmIL GgYsdBrzJEqvZLSYaHyfvLLH1hE90IIFvUOEGVAgL/Kq/OMWuOoHSmGycHpD7jPZ2YSNOsMv /u4g4/v20mxzCiL3a4i/GPNSuv0dk7F9Xk0QNG8UDhNX0BK/XD5e7hjpwXvdytUH+OsPEqwt A24Y1yabBe1HqZv/wiTI7lwAtDg8X8dC3nfJK8RgFHRqDr0u93JT7StyKYJohKNY1hGTryVa rnHFB+BeZutVU9RC48Gw6jjshcmUyclnkjyNG8ufnaVpW9yt+SEzvRq8/P1wR8zm+BbnuSY3 46T03k2GtXOMaKTPI7y4WDBs3s/SjJCfAwSpH5JgduWUItTZA2y5igfeZRVxlMng3F3OEfdu l6A9lmvvpdbwlkPe7nY0QRI447EdjbkLoQh/W/MNViLOhZzcmSPHVWdjl+OcpCEjgVshcbVn 5NVnw89Gd52XaUJ9ap8eQ5ni3iW9ARi4+9Uw7QIF/WZ43GpNrgWlgEoEaGYlAViC5wqjZ1kL RdwmDGjdAkdLP9pUdlFe2QzCvyOZ27FjziaskSr5AY4lS3nQ3QARAQABiQIlBBgBCgAPBQJV z9EvAhsMBQkHhh+AAAoJEJ8J5d/C8fFUeVgP/jXIKWGAxnmp1Cyqu3Mod0E1bcS2vsV/XbsQ pMMqwFB3za0MD4eoEcJ3aQn2/JzGI5+opygJb2pgKjbGpx2HVZrupGPhenMbqhBN8YhXWZLN lJPKt38D3DEJmiKWnEtfMzkfMBUUjUahypfBWe2slrYyve9LYoPrrEhPoaR11m/ZHveoolFi XlLTeCTxz30sw+Ucae1hEsD6329N9E/nxoJX3yc+O4EkItI84kfYAogfSSkXR7tguzSjY4kE 54nt25mFFFpwy9bG0Tm6CjNFh9njBQUaGbSamM+jjqy/VM7ptbnc8aJ+2Hdj0lv4pLuDE0SX EsXkI8z1KtQF6gJMDx+q6sS1fOhsMwG7aPY5frvdxZI1n+YYnXaIAGOxajazd55JKMDbAG+t yLu9BavKB3d0syzRTnlDyc2bjJFLLr6AwVNf32898gZD5b8v7Bz6uKyUYmpKr5vrdFKYHOGq FtHba/CgGtiZlywkJtTZ6jy9S0QJig+m7e6+KeKZMgWyu4x0E8FwBfHL5Gd1E+1SacSNwI2U pRPryQ9MNZ46eqXeoEmhRrxHsXice25gKDQcEog0psmdI/J7aNlCD/oomxS5jVSWwZ3r5rdx fTeG4WnaYqztCK8+0aCsEClkoqU32uKKsRzFrUjzT684u1iJmnvphFKedybWurJDalkJHraC Message-ID: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com> Date: Tue, 19 Feb 2019 12:25:32 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Outbound-SMTP-Client: 10.150.34.131, dhcp-10-150-34-131.cisco.com X-Outbound-Node: rcdn-core-5.cisco.com Archived-At: Subject: [hackathon] EST over coaps at the hackathon X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 17:25:36 -0000 Hi, By any chance might there be testing of EST over coaps at this hackathon?  Is anyone ready to test? Thanks, Pete From nobody Tue Feb 19 09:38:00 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4416F130F2A for ; Tue, 19 Feb 2019 09:37:58 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=retevia.net Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bT-fxUZfyCE for ; Tue, 19 Feb 2019 09:37:56 -0800 (PST) Received: from eastern.maple.relay.mailchannels.net (eastern.maple.relay.mailchannels.net [23.83.214.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A4C112950A for ; Tue, 19 Feb 2019 09:37:56 -0800 (PST) X-Sender-Id: dreamhost|x-authsender|lee.howard@retevia.net Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 05BF15E3582 for ; Tue, 19 Feb 2019 17:37:55 +0000 (UTC) Received: from pdx1-sub0-mail-a34.g.dreamhost.com (unknown [100.96.19.78]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id 94E7B5E36F6 for ; Tue, 19 Feb 2019 17:37:54 +0000 (UTC) X-Sender-Id: dreamhost|x-authsender|lee.howard@retevia.net Received: from pdx1-sub0-mail-a34.g.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384) by 0.0.0.0:2500 (trex/5.16.2); Tue, 19 Feb 2019 17:37:54 +0000 X-MC-Relay: Neutral X-MailChannels-SenderId: dreamhost|x-authsender|lee.howard@retevia.net X-MailChannels-Auth-Id: dreamhost X-Print-Troubled: 2c45e95b244d5c0c_1550597874868_1922329636 X-MC-Loop-Signature: 1550597874868:3976254047 X-MC-Ingress-Time: 1550597874867 Received: from pdx1-sub0-mail-a34.g.dreamhost.com (localhost [127.0.0.1]) by pdx1-sub0-mail-a34.g.dreamhost.com (Postfix) with ESMTP id F247D7FF1E for ; Tue, 19 Feb 2019 09:37:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=retevia.net; h=subject:to :references:from:message-id:date:mime-version:in-reply-to :content-type; s=retevia.net; bh=TWyyxF6VIwGmpr3YsAjR9RytkSg=; b= qA6GPaeU/4nBJ3DDZ7b5mXpoUXQN6frF6YQ1uDoZnTyUeRnNSkAbr0y34yYJTEGT 1dx8vR8SQH0gE4MW8R9C+JPL3d1hRjBgJW9h/o20IuDqUmBt6PTxxq2vjhi4iFZW 7WD6BmDcWGaMQfy4Dkq1KaPPqCYxshYNkDu3ma6JvCQ= Received: from [192.168.1.135] (ip68-100-71-215.dc.dc.cox.net [68.100.71.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: lee.howard@retevia.net) by pdx1-sub0-mail-a34.g.dreamhost.com (Postfix) with ESMTPSA id EA1A77FF16 for ; Tue, 19 Feb 2019 09:37:52 -0800 (PST) To: hackathon@ietf.org References: X-DH-BACKEND: pdx1-sub0-mail-a34 From: Lee Howard Message-ID: Date: Tue, 19 Feb 2019 12:37:51 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------61CC91670C7874F315AF8B91" Content-Language: en-US X-VR-OUT-STATUS: OK X-VR-OUT-SCORE: 0 X-VR-OUT-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedutddrtdeggddutddvucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuggftfghnshhusghstghrihgsvgdpffftgfetoffjqffuvfenuceurghilhhouhhtmecufedttdenucenucfjughrpefuvfhfhffkffgfgggjtgesrgdtreertdefheenucfhrhhomhepnfgvvgcujfhofigrrhguuceolhgvvgdrhhhofigrrhgusehrvghtvghvihgrrdhnvghtqeenucffohhmrghinhepihgvthhfrdhorhhgnecukfhppeeikedruddttddrjedurddvudehnecurfgrrhgrmhepmhhouggvpehsmhhtphdphhgvlhhopegludelvddrudeikedruddrudefhegnpdhinhgvthepieekrddutddtrdejuddrvdduhedprhgvthhurhhnqdhprghthhepnfgvvgcujfhofigrrhguuceolhgvvgdrhhhofigrrhgusehrvghtvghvihgrrdhnvghtqedpmhgrihhlfhhrohhmpehlvggvrdhhohifrghrugesrhgvthgvvhhirgdrnhgvthdpnhhrtghpthhtohephhgrtghkrghthhhonhesihgvthhfrdhorhhgnecuvehluhhsthgvrhfuihiivgeptd Archived-At: Subject: Re: [hackathon] question about hackathon cost X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 17:37:58 -0000 This is a multi-part message in MIME format. --------------61CC91670C7874F315AF8B91 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: quoted-printable Yes, it's true. I have collaborated with people at Hackathons who were only there for=20 the Hackathon, and did not rgister for or attend the IETF meeting. They=20 do request registration, but I suspect that's mostly to know what size=20 T-shirt and how many cookies to have. If you're undecided about whether to attend, definitely attend. Lee On 2/19/19 12:00 PM, Philip Perricone (phperric) wrote: > > Hello, > > I have a questions related to the upcoming IETF 104 Hackathon. > > On the IETF website, it says =93IETF Hackathons are free to attend and=20 > open to everyone=94. > > It seems obvious, but could anyone with experience here confirm that=20 > registration (and payment) for the overall IETF conference > > is NOT necessary to attend/participate in the Hackathon event? > > In other words, the Hackathon truly is =93free and open=94? > > I want to make sure that I understand correctly. > > Thanks! > > Philip Perricone > > Cisco Systems, Inc. > > Software Engineer > > Security & Trust Organization > > Research Triangle Park, NC > > > _______________________________________________ > hackathon mailing list > hackathon@ietf.org > https://www.ietf.org/mailman/listinfo/hackathon --------------61CC91670C7874F315AF8B91 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable

Yes, it's true.

I have collaborated with people at Hackathons who were only there for the Hackathon, and did not rgister for or attend the IETF meeting. They do request registration, but I suspect that's mostly to know what size T-shirt and how many cookies to have.

If you're undecided about whether to attend, definitely attend.

Lee

On 2/19/19 12:00 PM, Philip Perricone (phperric) wrote:

Hello,

=A0

I have a questions related to the upcoming IETF 104 Hackathon.

=A0

On the IETF website, it says =93IETF Hackathons are free to attend and open to everyone=94.

It seems obvious, but could anyone with experience here confirm that registration (and payment) for the overall IETF conference

is NOT necessary to attend/participate in the Hackathon event?

=A0

In other words, the Hackathon truly is =93free and open=94?

I want to make sure that I understand correctly.

=A0

Thanks!

=A0

Philip Perrico= ne

Cisco Systems, Inc.

Software Engin= eer

Security & Trust Organization

Research Trian= gle Park, NC

=A0


____________________________=
___________________
hackathon mailing list
=
hackathon@ietf.org
https://www.ietf.org/mailman/listinfo/hackathon
--------------61CC91670C7874F315AF8B91-- From nobody Tue Feb 19 09:50:37 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE145130F2B for ; Tue, 19 Feb 2019 09:50:35 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.5 X-Spam-Level: X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NXS0xCBm; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=AwNgbjt5 Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ekpZYH93Q1so for ; Tue, 19 Feb 2019 09:50:33 -0800 (PST) Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA0D3130F41 for ; Tue, 19 Feb 2019 09:50:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14401; q=dns/txt; s=iport; t=1550598632; x=1551808232; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=s5tgtl3vJ72nU/lcDRpGLdxkIyJtPBEMiq6idUyXvMU=; b=NXS0xCBmf1OdIOc6VEkMWSEVHKux1L2/2JRGZp+QRzxnvjJK1NY1+D7z cWbEefOcGunhYyfJC+wN05Ppu9HGb1SZyUfOP20nlwcvSUcqspfkOMUz/ OJ0Hodpk92/pWhp9PNXZk2tOdc6kjWiH2WJfHzJ/6f3nhfhcJrZDQ69F+ Q=; IronPort-PHdr: =?us-ascii?q?9a23=3AzCysRxK1ZYgawbU0SNmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEDwL/PuZDESF8VZX1gj9Ha+YgBY?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAAB8QGxc/4oNJK1jGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUQUBAQEBCwGBDSMpJwNndAQLJwqDfINHA4RQiyVKgg2SKoV?= =?us-ascii?q?xgSQDVAsBARgBCgmBS4IvRgIXg1QiNAkNAQMBAQIBAQJtHAyFSgEBAQEDAQE?= =?us-ascii?q?hChMBASYGDA8CAQgRAwECKAMCAgIlCxQJCAEBBAESgldJAYEOTAMVAQIMolU?= =?us-ascii?q?CihRxgS+CeAEBBYJFgkEYggsDBYV6hkoXgX+BOB+CTIMeAQGCAQ0JglMxgia?= =?us-ascii?q?KEwOGGocXjAQJAoZ1hDSHLhmBcIVViz+KRZF+AgQCBAUCDQEBBYFGOIFWcBU?= =?us-ascii?q?7KgGCQYIcDBeDS4UUhT9yAYEnixwBgR4BAQ?= X-IronPort-AV: E=Sophos;i="5.58,388,1544486400"; d="scan'208,217";a="303141034" Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 17:50:24 +0000 Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x1JHoNjl032042 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 19 Feb 2019 17:50:23 GMT Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:50:22 -0600 Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 19 Feb 2019 11:50:22 -0600 Received: from NAM01-BN3-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Tue, 19 Feb 2019 11:50:22 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s5tgtl3vJ72nU/lcDRpGLdxkIyJtPBEMiq6idUyXvMU=; b=AwNgbjt50BqV+TKD0bnWiVIqMrTib86Uzq3xxouyGh+IMe2RMMJ6lFqvVIQAJWdN0inH8qJ7lnuPtOt75AVzuYzJaaY878QwHR0xKdtMBdPmn5NF/T0j3WJq04M5urYOl2RksaN2ACUVxbTE+y5SfFcPtqPagmes1P9b+dSqNd4= Received: from DM6PR11MB3547.namprd11.prod.outlook.com (20.178.229.140) by DM6PR11MB2777.namprd11.prod.outlook.com (20.176.100.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1622.16; Tue, 19 Feb 2019 17:50:21 +0000 Received: from DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79]) by DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79%5]) with mapi id 15.20.1622.018; Tue, 19 Feb 2019 17:50:21 +0000 From: "Charles Eckel (eckelcu)" To: Lee Howard , "hackathon@ietf.org" Thread-Topic: [hackathon] question about hackathon cost Thread-Index: AdTIdKO5JEJT+iJiRUe2nxdyTmJOWQABTJuA//99X4A= Date: Tue, 19 Feb 2019 17:50:20 +0000 Message-ID: <9FF2F5DB-14C7-4DD4-8AE6-AF5646407105@cisco.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/10.16.0.190211 authentication-results: spf=none (sender IP is ) smtp.mailfrom=eckelcu@cisco.com; x-originating-ip: [128.107.241.168] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: f16f4d6a-5b07-41ba-c6c2-08d69692b7b0 x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:DM6PR11MB2777; x-ms-traffictypediagnostic: DM6PR11MB2777: x-ms-exchange-purlcount: 2 x-microsoft-exchange-diagnostics: =?utf-8?B?MTtETTZQUjExTUIyNzc3OzIzOk9jMUZhMFprM3ZnaWVTeGVROElNbER5T1p2?= =?utf-8?B?MGF2eDdhMFh6L29kMGJ5T1VCK0JWYnVLOHRCTlBPRm1YdDVndktFOTFMRFJs?= =?utf-8?B?OW5Bb1phdkFTbGhhalRWSmxWREoycmFiTEltRm1nL3V4eW8reDNCTW4yb2Ft?= =?utf-8?B?bEZZLzZlQVM4ZXJNZC9tcGtnWUhsYjNWYmMzVkVlVlRZR3A1SUgxbEZCcjd6?= =?utf-8?B?NVBsdlhIeTQ0elk3UjdtS0psdmRjTE12UFFrL2xNQS9NQWJibDlQRjFyVnRz?= =?utf-8?B?VmNaTWJFNWZyY0RJRkFxZXNjajl1TnlqU3UrMkZqeHN3amtIRXJDVThFZXRP?= =?utf-8?B?NkJQQkxHVEMzK0lLOVE5aUh4RHNmb1NFa1ZjZkhObk5icmxvdlJlUFF0d3Fu?= =?utf-8?B?bDFBZ0EveFRrZzN6ZUpoUWZ1dlAxMVB4aHV1dGNlK2xHMUJUVlZoSlltSitq?= =?utf-8?B?MWtnanVLZlRCN3kyM21ZNmhlVk5jei9Pc0UwQ1pZMUlKRDNPOHA4ckI4NXN2?= =?utf-8?B?MFp5SGdtN0M4TDdrenZRWlVZM0d4SkR3alZwbWhNOWowd2t3MkRGcjAzRTFp?= =?utf-8?B?MHJ6SmNBRUN4R0N5M0RPSVZoSmlYUXp1eWd0OVFmVWxyYzFCNnlhNDNJNE1y?= =?utf-8?B?ekZWcjgxRFdYOFEvdmtRVHVGWHBURko1UHhGM1VlQVlHUnlnQ2c4Tk13TEQy?= =?utf-8?B?K3k0VVhpeWtZRlYwY3lzcHgxU3d4cFU4NlZGVVc3TUJyb0VVTHRNT0NiRFRE?= =?utf-8?B?M0tiOFhvS0lCL0UyYVpOU2x6U25CZjV1LytZWmJYNldJQUFFUUh4NEVsb0lY?= =?utf-8?B?M0FlSUhCRHpkUis2NTRFWE1pWHNwWm5TVHo3RGJBcmpXMTJYQXpDTDdnUXdj?= =?utf-8?B?Syt4WmF5NEtlUGQyMWF0WTJmZ0xNOU9DVU10UDBsZUkwd2Vkd3VFdHJPdEtk?= =?utf-8?B?MmVYYUFicFFyY1dOOUR1VDkwTjdBcWZIZVQxTlhwQlhJb0s1KzJTV3ZJMmFK?= =?utf-8?B?RkJsTkNzVGtRcFovZm8zZzhrNE9GbkR5aHRTMmRwVTBVdmZ0K0tXUkxQNEtF?= =?utf-8?B?dW1UUTVkaDRhWFpTS0RYMG84MDVCTjduQldMUUdKVkxoYWprMUhZMTRCZkpZ?= =?utf-8?B?eCtDcHJ4ZTh0azh0ME95YnZYL3Bpc3ZxVkRUYkxXUDViK0xLS0xMVlVxakMv?= =?utf-8?B?ZmlHVE5qMWh3U0pyU0FDMG1scHNWb3J3SjdPRjBxbjlWQTNoWUc5bVJ6QjBK?= =?utf-8?B?R1NCN1NKSFBpWGpOVTFiSWNMWDllcGZCd1F2OWpMckVTZHhkMDVuUnVmK216?= =?utf-8?B?L0dNTnZzSnc4aUNzU0c0eXRWelhsaGIxZEcwMkxaUlk3cGZwOGV0clNRUDRy?= =?utf-8?B?QlVYMVdCY01SREt6QjgvN0srbGEzUkJSeTdTWXhZdXNZVjdLSHQ3OWh0MUdE?= =?utf-8?B?R0lmU1gvSVdGbjdtbENEYmlLVmw3MS9KZ3Nic25jNUlweGx2d01RbWVqQjA1?= =?utf-8?B?UEFsRGNOQUhhdmJ4bnliQWs0U0JNbkwvS25ya0l6Vk5iZk1kL3NNRi9xbVhS?= =?utf-8?B?WGJ6bVNRMW1mdm9IWGlpV3ZlT2JDankzZnN3dk9lMUVvRm1ad1M3ZzUzazZw?= =?utf-8?B?M3ZxUTltelVvcEZuZW9rUVl1dUN4TEtvdXdhbS9PRUpxakgwZ2lJU2RqWXZJ?= =?utf-8?B?ZTBDUkp1UnZXT1gyajdZSzloQU1INFhadkZOR3EzYWNXbU9HQkR4QVhyNkhh?= =?utf-8?B?bDZRR3p5ck5vN1F2MkRSMW1GZndQYkp5S01oU082b1NKdjhKOE8wajQ1S1Fi?= =?utf-8?B?TnVZNWtNd01reWo2MTZkVmY3aHAzbTVCRUdma1lWWFltaGc9PQ==?= x-microsoft-antispam-prvs: x-forefront-prvs: 09538D3531 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(396003)(39860400002)(366004)(376002)(189003)(199004)(316002)(256004)(6436002)(53546011)(6506007)(6486002)(58126008)(11346002)(68736007)(446003)(102836004)(54896002)(86362001)(71190400001)(97736004)(5660300002)(14444005)(2906002)(478600001)(82746002)(83716004)(6512007)(236005)(229853002)(6306002)(71200400001)(66066001)(14454004)(33656002)(476003)(2616005)(76176011)(99286004)(966005)(36756003)(53936002)(25786009)(2501003)(606006)(486006)(105586002)(8936002)(81166006)(81156014)(186003)(7736002)(8676002)(3846002)(6116002)(6246003)(106356001)(110136005)(790700001)(26005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB2777; H:DM6PR11MB3547.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: pFcp06m7gM7UWDQIHj0Dq5O85j8vZzXuclERgXaesqplfl8nx03kwG3T78qT4iO5yBpcJTSdXmhM3VT30ESSBNc647XwR4ZEjbY2gfvXTm/I2BObtJhy9NX77ddqyklx4hcCLEnPoJ6YjhWLj8joCocpPYWeyIu2ENGQvc0wDH/rpAJRxQRpP8zO3Qzugc+owg+jUXoVE+O9X82CTe+2KPbaokTPaEEa89eL7PDKrWaU/CCCeiuziSkQg80PPuFKTIujoFVTRiWPaZYBcJzrOPZsdtY/NRRxBNmbvzE4PGWPS7l0CnXBQ53EGmoQQNZ4x1Y6kd7RhX7iFhgNW6jBNpNXk1rghrYr1BH9uq7hxNhzeHx3p7WK26v0Ze+sOXP6uroLVbswmZOvroYldqvdGUi3/R9b483G1iKPdfltJ5s= Content-Type: multipart/alternative; boundary="_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: f16f4d6a-5b07-41ba-c6c2-08d69692b7b0 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2019 17:50:20.9640 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB2777 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.36.7.21, xch-aln-011.cisco.com X-Outbound-Node: alln-core-5.cisco.com Archived-At: Subject: Re: [hackathon] question about hackathon cost X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 17:50:36 -0000 --_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 UGxlYXNlIHNlZSBpbmxpbmUNCg0KRnJvbTogaGFja2F0aG9uIDxoYWNrYXRob24tYm91bmNlc0Bp ZXRmLm9yZz4gb24gYmVoYWxmIG9mIExlZSBIb3dhcmQgPGxlZS5ob3dhcmRAcmV0ZXZpYS5uZXQ+ DQpEYXRlOiBUdWVzZGF5LCBGZWJydWFyeSAxOSwgMjAxOSBhdCA5OjM4IEFNDQpUbzogImhhY2th dGhvbkBpZXRmLm9yZyIgPGhhY2thdGhvbkBpZXRmLm9yZz4NClN1YmplY3Q6IFJlOiBbaGFja2F0 aG9uXSBxdWVzdGlvbiBhYm91dCBoYWNrYXRob24gY29zdA0KDQoNClllcywgaXQncyB0cnVlLg0K DQpDb3JyZWN0LCBoYWNrYXRob24gaXMgZnJlZS4gUmVnaXN0cmF0aW9uIGZvciB0aGUgaGFja2F0 aG9uIGlzIHJlcXVpcmVkLCBidXQgaXQgaXMgZnJlZS4gUmVnaXN0cmF0aW9uIGZvciB0aGUgSUVU RiBtZWV0aW5nIGlzIHNlcGFyYXRlIGFuZCBpcyBvcHRpb25hbCBmb3IgaGFja2F0aG9uIHBhcnRp Y2lwYW50cy4gSGVyZSBpcyB0aGUgaGFja2F0aG9uIHJlZ2lzdHJhdGlvbiBsaW5rIGh0dHBzOi8v d3d3LmlldGYub3JnL3JlZ2lzdHJhdGlvbi9pZXRmMTA0L2hhY2thdGhvbnJlZ2lzdHJhdGlvbi5w eQ0KDQpJIGhhdmUgY29sbGFib3JhdGVkIHdpdGggcGVvcGxlIGF0IEhhY2thdGhvbnMgd2hvIHdl cmUgb25seSB0aGVyZSBmb3IgdGhlIEhhY2thdGhvbiwgYW5kIGRpZCBub3Qgcmdpc3RlciBmb3Ig b3IgYXR0ZW5kIHRoZSBJRVRGIG1lZXRpbmcuIFRoZXkgZG8gcmVxdWVzdCByZWdpc3RyYXRpb24s IGJ1dCBJIHN1c3BlY3QgdGhhdCdzIG1vc3RseSB0byBrbm93IHdoYXQgc2l6ZSBULXNoaXJ0IGFu ZCBob3cgbWFueSBjb29raWVzIHRvIGhhdmUuDQoNCldoaWNoIHlvdSBoYXZlIHRvIGFncmVlIGlz IHN1cGVyIGltcG9ydGFudCDimLoNCg0KQWN0dWFsbHksIGR1ZSB0byB0aGUgaGFja2F0aG9uIHJl Z2lzdHJhdGlvbiByYXRlcyBzbyBmYXIsIHdlIG1hZGUgdGhlIGNhbGwgdG8gcmVsb2NhdGUgdGhl IGhhY2thdGhvbiB0byBhIGxhcmdlciBzcGFjZS4gV2Ugd2lsbCBhbHNvIG9yZGVyIG1vcmUgZm9v ZCwgZXRjLiBTbyBwbGVhc2UgcmVnaXN0ZXIgYW5kIHJlZ2lzdGVyIGluIGFkdmFuY2UuIFRoaXMg aXMgdmVyeSBoZWxwZnVsIGZvciBvdXIgcGxhbm5pbmcgcHVycG9zZXMuIFdlIGhhdmUgcnVuIG91 dCBvZiBzcGFjZSBvbiBhdCBsZWFzdCBvbmUgb2NjYXNpb24gYW5kIGhhZCB0byBjbG9zZSByZWdp c3RyYXRpb24sIHNvIGl0IGlzIGluIHlvdXIgYmVzdCBpbnRlcmVzdCB0byByZWdpc3RlciBiZWZv cmUgYm9va2luZyB5b3VyIHRyYXZlbC4NCg0KQ2hlZXJzLCBDaGFybGVzDQoNCklmIHlvdSdyZSB1 bmRlY2lkZWQgYWJvdXQgd2hldGhlciB0byBhdHRlbmQsIGRlZmluaXRlbHkgYXR0ZW5kLg0KDQpM ZWUNCk9uIDIvMTkvMTkgMTI6MDAgUE0sIFBoaWxpcCBQZXJyaWNvbmUgKHBocGVycmljKSB3cm90 ZToNCkhlbGxvLA0KDQpJIGhhdmUgYSBxdWVzdGlvbnMgcmVsYXRlZCB0byB0aGUgdXBjb21pbmcg SUVURiAxMDQgSGFja2F0aG9uLg0KDQpPbiB0aGUgSUVURiB3ZWJzaXRlLCBpdCBzYXlzIOKAnElF VEYgSGFja2F0aG9ucyBhcmUgZnJlZSB0byBhdHRlbmQgYW5kIG9wZW4gdG8gZXZlcnlvbmXigJ0u DQpJdCBzZWVtcyBvYnZpb3VzLCBidXQgY291bGQgYW55b25lIHdpdGggZXhwZXJpZW5jZSBoZXJl IGNvbmZpcm0gdGhhdCByZWdpc3RyYXRpb24gKGFuZCBwYXltZW50KSBmb3IgdGhlIG92ZXJhbGwg SUVURiBjb25mZXJlbmNlDQppcyBOT1QgbmVjZXNzYXJ5IHRvIGF0dGVuZC9wYXJ0aWNpcGF0ZSBp biB0aGUgSGFja2F0aG9uIGV2ZW50Pw0KDQpJbiBvdGhlciB3b3JkcywgdGhlIEhhY2thdGhvbiB0 cnVseSBpcyDigJxmcmVlIGFuZCBvcGVu4oCdPw0KSSB3YW50IHRvIG1ha2Ugc3VyZSB0aGF0IEkg dW5kZXJzdGFuZCBjb3JyZWN0bHkuDQoNClRoYW5rcyENCg0KUGhpbGlwIFBlcnJpY29uZQ0KQ2lz Y28gU3lzdGVtcywgSW5jLg0KU29mdHdhcmUgRW5naW5lZXINClNlY3VyaXR5ICYgVHJ1c3QgT3Jn YW5pemF0aW9uDQpSZXNlYXJjaCBUcmlhbmdsZSBQYXJrLCBOQw0KDQoNCg0KDQpfX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KDQpoYWNrYXRob24gbWFpbGlu ZyBsaXN0DQoNCmhhY2thdGhvbkBpZXRmLm9yZzxtYWlsdG86aGFja2F0aG9uQGlldGYub3JnPg0K DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2hhY2thdGhvbg0K --_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy IDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiQXBwbGUgQ29sb3IgRW1vamkiOw0KCXBh bm9zZS0xOjAgMCAwIDAgMCAwIDAgMCAwIDA7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToi VGltZXMgTmV3IFJvbWFuIFwoQm9keSBDU1wpIjsNCglwYW5vc2UtMToyIDExIDYgNCAyIDIgMiAy IDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBhbm9zZS0xOjIg MTEgNiA5IDIgMiA0IDMgMiA0O30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1h bCwgbGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJv dHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmki LHNhbnMtc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJp b3JpdHk6OTk7DQoJY29sb3I6IzA1NjNDMTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30N CmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3Jp dHk6OTk7DQoJY29sb3I6Izk1NEY3MjsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnBy ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkhUTUwgUHJlZm9y bWF0dGVkIENoYXIiOw0KCW1hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZv bnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6IkNvdXJpZXIgTmV3Ijt9DQpwLm1zb25vcm1h bDAsIGxpLm1zb25vcm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25v cm1hbDsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1z by1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6 MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNwYW4uRW1haWxT dHlsZTE5DQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp IixzYW5zLXNlcmlmOw0KCWNvbG9yOndpbmRvd3RleHQ7fQ0Kc3Bhbi5IVE1MUHJlZm9ybWF0dGVk Q2hhcg0KCXttc28tc3R5bGUtbmFtZToiSFRNTCBQcmVmb3JtYXR0ZWQgQ2hhciI7DQoJbXNvLXN0 eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCI7DQoJ Zm9udC1mYW1pbHk6Q29uc29sYXM7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjINCgl7bXNvLXN0eWxlLXR5 cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IlRpbWVzIE5ldyBSb21hbiIsc2VyaWY7 DQoJY29sb3I6d2luZG93dGV4dDt9DQouTXNvQ2hwRGVmYXVsdA0KCXttc28tc3R5bGUtdHlwZTpl eHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtz aXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4waW4gMS4waW4gMS4waW47fQ0KZGl2 LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYg Z3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0i MTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86 c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEi IC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBs YW5nPSJFTi1VUyIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIiPg0KPGRpdiBjbGFzcz0i V29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNp emU6MTIuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+ UGxlYXNlIHNlZSBpbmxpbmU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250LWZhbWlseTomcXVvdDtUaW1l cyBOZXcgUm9tYW4mcXVvdDssc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxk aXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRk aW5nOjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn aW4tbGVmdDouNWluIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtjb2xvcjpibGFj ayI+RnJvbToNCjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6 YmxhY2siPmhhY2thdGhvbiAmbHQ7aGFja2F0aG9uLWJvdW5jZXNAaWV0Zi5vcmcmZ3Q7IG9uIGJl aGFsZiBvZiBMZWUgSG93YXJkICZsdDtsZWUuaG93YXJkQHJldGV2aWEubmV0Jmd0Ozxicj4NCjxi PkRhdGU6IDwvYj5UdWVzZGF5LCBGZWJydWFyeSAxOSwgMjAxOSBhdCA5OjM4IEFNPGJyPg0KPGI+ VG86IDwvYj4mcXVvdDtoYWNrYXRob25AaWV0Zi5vcmcmcXVvdDsgJmx0O2hhY2thdGhvbkBpZXRm Lm9yZyZndDs8YnI+DQo8Yj5TdWJqZWN0OiA8L2I+UmU6IFtoYWNrYXRob25dIHF1ZXN0aW9uIGFi b3V0IGhhY2thdGhvbiBjb3N0PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxvOnA+Jm5ic3A7 PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+WWVzLCBpdCdz IHRydWUuPG86cD48L286cD48L3A+DQo8cD48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtm b250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssc2VyaWYiPkNvcnJlY3QsIGhh Y2thdGhvbiBpcyBmcmVlLiBSZWdpc3RyYXRpb24gZm9yIHRoZSBoYWNrYXRob24gaXMgcmVxdWly ZWQsIGJ1dCBpdCBpcyBmcmVlLiBSZWdpc3RyYXRpb24gZm9yIHRoZSBJRVRGIG1lZXRpbmcgaXMg c2VwYXJhdGUgYW5kIGlzIG9wdGlvbmFsIGZvciBoYWNrYXRob24gcGFydGljaXBhbnRzLiBIZXJl IGlzIHRoZQ0KIGhhY2thdGhvbiByZWdpc3RyYXRpb24gbGluayA8YSBocmVmPSJodHRwczovL3d3 dy5pZXRmLm9yZy9yZWdpc3RyYXRpb24vaWV0ZjEwNC9oYWNrYXRob25yZWdpc3RyYXRpb24ucHki Pg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmVnaXN0cmF0aW9uL2lldGYxMDQvaGFja2F0aG9ucmVn aXN0cmF0aW9uLnB5PC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIHN0eWxlPSJtYXJnaW4t bGVmdDouNWluIj5JIGhhdmUgY29sbGFib3JhdGVkIHdpdGggcGVvcGxlIGF0IEhhY2thdGhvbnMg d2hvIHdlcmUgb25seSB0aGVyZSBmb3IgdGhlIEhhY2thdGhvbiwgYW5kIGRpZCBub3Qgcmdpc3Rl ciBmb3Igb3IgYXR0ZW5kIHRoZSBJRVRGIG1lZXRpbmcuIFRoZXkgZG8gcmVxdWVzdCByZWdpc3Ry YXRpb24sIGJ1dCBJIHN1c3BlY3QgdGhhdCdzIG1vc3RseSB0byBrbm93IHdoYXQgc2l6ZSBULXNo aXJ0IGFuZCBob3cNCiBtYW55IGNvb2tpZXMgdG8gaGF2ZS48bzpwPjwvbzpwPjwvcD4NCjxwPjxz cGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBS b21hbiZxdW90OyxzZXJpZiI+V2hpY2ggeW91IGhhdmUgdG8gYWdyZWUgaXMgc3VwZXIgaW1wb3J0 YW50DQo8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1 b3Q7QXBwbGUgQ29sb3IgRW1vamkmcXVvdDsiPuKYujwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z aXplOjEyLjBwdDtmb250LWZhbWlseTomcXVvdDtUaW1lcyBOZXcgUm9tYW4mcXVvdDssc2VyaWYi PjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0 O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+QWN0dWFsbHks IGR1ZSB0byB0aGUgaGFja2F0aG9uIHJlZ2lzdHJhdGlvbiByYXRlcyBzbyBmYXIsIHdlIG1hZGUg dGhlIGNhbGwgdG8gcmVsb2NhdGUgdGhlIGhhY2thdGhvbiB0byBhIGxhcmdlciBzcGFjZS4gV2Ug d2lsbCBhbHNvIG9yZGVyIG1vcmUgZm9vZCwgZXRjLiBTbyBwbGVhc2UgcmVnaXN0ZXIgYW5kIHJl Z2lzdGVyDQogaW4gYWR2YW5jZS4gVGhpcyBpcyB2ZXJ5IGhlbHBmdWwgZm9yIG91ciBwbGFubmlu ZyBwdXJwb3Nlcy4gV2UgaGF2ZSBydW4gb3V0IG9mIHNwYWNlIG9uIGF0IGxlYXN0IG9uZSBvY2Nh c2lvbiBhbmQgaGFkIHRvIGNsb3NlIHJlZ2lzdHJhdGlvbiwgc28gaXQgaXMgaW4geW91ciBiZXN0 IGludGVyZXN0IHRvIHJlZ2lzdGVyIGJlZm9yZSBib29raW5nIHlvdXIgdHJhdmVsLjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2ZvbnQtZmFt aWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+Q2hlZXJzLCBDaGFybGVzPG86 cD48L286cD48L3NwYW4+PC9wPg0KPHAgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPklmIHlvdSdy ZSB1bmRlY2lkZWQgYWJvdXQgd2hldGhlciB0byBhdHRlbmQsIGRlZmluaXRlbHkgYXR0ZW5kLg0K PG86cD48L286cD48L3A+DQo8cCBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+TGVlPG86cD48L286 cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41 aW4iPk9uIDIvMTkvMTkgMTI6MDAgUE0sIFBoaWxpcCBQZXJyaWNvbmUgKHBocGVycmljKSB3cm90 ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1hcmdpbi10b3A6 NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i bWFyZ2luLWxlZnQ6LjVpbiI+SGVsbG8sPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8cCBj bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+SSBoYXZlIGEgcXVlc3Rp b25zIHJlbGF0ZWQgdG8gdGhlIHVwY29taW5nIElFVEYgMTA0IEhhY2thdGhvbi48bzpwPjwvbzpw PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJz cDs8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVm dDouNWluIj5PbiB0aGUgSUVURiB3ZWJzaXRlLCBpdCBzYXlzIOKAnElFVEYgSGFja2F0aG9ucyBh cmUgZnJlZSB0byBhdHRlbmQgYW5kIG9wZW4gdG8gZXZlcnlvbmXigJ0uPG86cD48L286cD48L3A+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+SXQgc2VlbXMg b2J2aW91cywgYnV0IGNvdWxkIGFueW9uZSB3aXRoIGV4cGVyaWVuY2UgaGVyZSBjb25maXJtIHRo YXQgcmVnaXN0cmF0aW9uIChhbmQgcGF5bWVudCkgZm9yIHRoZSBvdmVyYWxsIElFVEYgY29uZmVy ZW5jZTxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1s ZWZ0Oi41aW4iPmlzIE5PVCBuZWNlc3NhcnkgdG8gYXR0ZW5kL3BhcnRpY2lwYXRlIGluIHRoZSBI YWNrYXRob24gZXZlbnQ/PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls ZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+SW4gb3RoZXIgd29yZHMsIHRoZSBIYWNr YXRob24gdHJ1bHkgaXMg4oCcZnJlZSBhbmQgb3BlbuKAnT88bzpwPjwvbzpwPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5JIHdhbnQgdG8gbWFrZSBz dXJlIHRoYXQgSSB1bmRlcnN0YW5kIGNvcnJlY3RseS48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz PSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDs8bzpwPjwvbzpwPjwv cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5UaGFua3Mh PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6 LjVpbiI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i bWFyZ2luLWxlZnQ6LjVpbiI+PHNwYW4gc3R5bGU9ImNvbG9yOmJsYWNrIj5QaGlsaXAgUGVycmlj b25lPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h cmdpbi1sZWZ0Oi41aW4iPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+Q2lzY28gU3lzdGVtcywg SW5jLjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt YXJnaW4tbGVmdDouNWluIj48c3BhbiBzdHlsZT0iY29sb3I6YmxhY2siPlNvZnR3YXJlIEVuZ2lu ZWVyPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h cmdpbi1sZWZ0Oi41aW4iPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+U2VjdXJpdHkgJmFtcDsg VHJ1c3QgT3JnYW5pemF0aW9uPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxzcGFuIHN0eWxlPSJjb2xvcjpibGFjayI+ UmVzZWFyY2ggVHJpYW5nbGUgUGFyaywgTkM8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7PG86cD48L286cD48 L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PGJyPg0K PGJyPg0KPG86cD48L286cD48L3A+DQo8cHJlIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxvOnA+PC9vOnA+PC9w cmU+DQo8cHJlIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5oYWNrYXRob24gbWFpbGluZyBsaXN0 PG86cD48L286cD48L3ByZT4NCjxwcmUgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxhIGhyZWY9 Im1haWx0bzpoYWNrYXRob25AaWV0Zi5vcmciPmhhY2thdGhvbkBpZXRmLm9yZzwvYT48bzpwPjwv bzpwPjwvcHJlPg0KPHByZSBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PGEgaHJlZj0iaHR0cHM6 Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9oYWNrYXRob24iPmh0dHBzOi8vd3d3Lmll dGYub3JnL21haWxtYW4vbGlzdGluZm8vaGFja2F0aG9uPC9hPjxvOnA+PC9vOnA+PC9wcmU+DQo8 L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg== --_000_9FF2F5DB14C74DD48AE6AF5646407105ciscocom_-- From nobody Tue Feb 19 10:58:56 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46554128D0B for ; Tue, 19 Feb 2019 10:58:55 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.2 X-Spam-Level: X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ic7n1KYZ8zQL for ; Tue, 19 Feb 2019 10:58:53 -0800 (PST) Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 222451277CC for ; Tue, 19 Feb 2019 10:58:53 -0800 (PST) Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 334EB3826A; Tue, 19 Feb 2019 13:58:46 -0500 (EST) Received: by sandelman.ca (Postfix, from userid 179) id 2E50D83B; Tue, 19 Feb 2019 13:58:52 -0500 (EST) Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 2CCAB55A; Tue, 19 Feb 2019 13:58:52 -0500 (EST) From: Michael Richardson To: Peter Beal cc: "hackathon\@ietf.org" In-Reply-To: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com> References: <7505e2cb-5f06-d7dd-f166-cfd3f33fc158@cisco.com> X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1 X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m Archived-At: Subject: Re: [hackathon] EST over coaps at the hackathon X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 19 Feb 2019 18:58:55 -0000 Peter Beal wrote: > By any chance might there be testing of EST over coaps at this > hackathon?=C2=A0 Is anyone ready to test? Yes, you should join the ANIMA table. -- ] Never tell me the odds! | ipv6 mesh network= s [ ] Michael Richardson, Sandelman Software Works | IoT architect = [ ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails = [ From nobody Wed Feb 20 15:54:30 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65FC6130E2F for ; Wed, 20 Feb 2019 15:54:28 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=liveuclac.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kwX-6JqXdu4b for ; Wed, 20 Feb 2019 15:54:26 -0800 (PST) Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150097.outbound.protection.outlook.com [40.107.15.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34BC7130E58 for ; Wed, 20 Feb 2019 15:54:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=liveuclac.onmicrosoft.com; s=selector1-ucl-ac-uk; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UAzEvhvf3cRTPgOs390HVcbFgC2NhtYKLP6KvA3dcQg=; b=AnOnD+SPCsDoHqiFjqwneGVeZc0MlkCti9t+sL897PzZNjSTAIotLuRmT9nPAeE+K0lRG9gzvyXPsYg9uFM7NUgKe9YakX/Vi2LEvmLcOuOLtmwtugdhccKD4iNAB4I+62C97Bx9xtvLaf0cyoEuOlBS4XxvSHdT1CNh4MQcHt0= Received: from AM6PR01MB4440.eurprd01.prod.exchangelabs.com (20.177.190.225) by AM6PR01MB5191.eurprd01.prod.exchangelabs.com (20.178.86.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.14; Wed, 20 Feb 2019 23:54:24 +0000 Received: from AM6PR01MB4440.eurprd01.prod.exchangelabs.com ([fe80::515e:399a:958:b398]) by AM6PR01MB4440.eurprd01.prod.exchangelabs.com ([fe80::515e:399a:958:b398%4]) with mapi id 15.20.1622.018; Wed, 20 Feb 2019 23:54:23 +0000 From: "Rajaei, Saman" To: "hackathon@ietf.org" Thread-Topic: Invitation letters for visa purposes? Thread-Index: AQHUyXea48Q0GtnW3UKX1rycZzpXUw== Date: Wed, 20 Feb 2019 23:54:23 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=s.rajaei.17@ucl.ac.uk; x-originating-ip: [82.35.86.181] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: e1d3dfaf-c418-4d4d-0986-08d6978ebd80 x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600110)(711020)(4605104)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7167020)(7153060)(7193020); SRVR:AM6PR01MB5191; x-ms-traffictypediagnostic: AM6PR01MB5191: x-microsoft-exchange-diagnostics: =?iso-8859-1?Q?1; AM6PR01MB5191; 23:kLq5vpE51pyPAI7VJIvZ2OenCvM50IC2JodYalB?= =?iso-8859-1?Q?BaTzE1ehyrAsDZ2lH2wcJ0CsQokHMq7vjNquVLYsybuiHTUnGA7D6gEkVM?= =?iso-8859-1?Q?CtuElECA6zygzEBXsigGSsTVfCOrUbhgSeNdxs0A6tuxGrOUNHoF+W4Cfd?= =?iso-8859-1?Q?VdrOfoKhfh3brX8xYkT6bnFJ8wUisPqpPEUrI56iT4cs6QGGfOLCnXlcnQ?= =?iso-8859-1?Q?nsnl02jGf/HxglyKK+d1kSVYn9KsuJhmoGqO7UX+3PQPsQH1I7YxUEZQ49?= =?iso-8859-1?Q?aLsOlU8a2MImebjB5CGknCRELCsm2tbsKytjwOukEKicelVXVHFHqPLHKA?= =?iso-8859-1?Q?72rdORk9bCNbZSokqd85f89zSWsuCO5aosp1McsD6RROzEuQTUESssU0uy?= =?iso-8859-1?Q?qUxSWKJTHH/y3ge6AwTZdhOOd9C9lCsI0Zlk6NI3KnTWjax4G7kNmbaKi0?= =?iso-8859-1?Q?sF2nfsdis8lnAqyxpVAgwp0NJmJ6WGbCO+7RT0F6s0CyshHPmGMBm0q4UY?= =?iso-8859-1?Q?K6dpY8gqKLE57ogLwUs/LBVI4GA2kMElEwAXiixl0SAkjBNDOh8KTYohLL?= =?iso-8859-1?Q?VjeEr1yfdPTXudGmBGK9yteawRl/3vLxrLfkCAlana6G2woAqLFYJqIv1t?= =?iso-8859-1?Q?vjO9RuQzI2zkrYdBSarP/kx4Tn+N+CZLmb/nh+XPwPSXvdhro8p1ZEqSRe?= =?iso-8859-1?Q?gQJX0YGx0j4h8ZuOmC+4J9OhAd3AL0O1XloF2nyIg/c/n+BjLRzlg9c6ha?= =?iso-8859-1?Q?oiXDn2FguMjnaXDqq3hpHFY2WOGgiuZx4DuwRVs07a3Z2GeoNF94APAY/Q?= =?iso-8859-1?Q?Vj96IHPhvmgoyeNgvxxWXsk/Ex71SnO/cNWjksdBKLqwfy7KfK5Qe4gcEM?= =?iso-8859-1?Q?RD8klQlQ+/vBos6i90PdbU8GvOJ8/LQunbJocpTTa3IZJUy3onhoDCGZRq?= =?iso-8859-1?Q?Yky/DZDZ7SNonHyVGd5VhbY6gBiPfYHjXxsUmUf7j6/QAPzRJe6Gi+6SpV?= =?iso-8859-1?Q?ucUeK+rdvR7Z1TWcwjomBho8jJZWY3SBsM+tLYuxNNVaTYNRdmtxsYRVFx?= =?iso-8859-1?Q?VvxzRkkNzCZyK1izLy1P2QV9ZU6q6ppfA8m0xgJtkATlvjUpkEa4Po/bXs?= =?iso-8859-1?Q?yEvVyePv8EkHH9FnFa1+/jxSlCwdPGwQvItSzA5V2G/pzhwrmGGTkHBG0/?= =?iso-8859-1?Q?2fUxt5oCjsSysdGxwtdC3ujTzGqZB6YI3rLjp8kTqFPVK+dtQYKTdM4qOm?= =?iso-8859-1?Q?WHSFsGpfnVjwkc1UjNEYUrOAzNLPY6E2N5OY1hjMdpmXSNAeUDt1zAo6i6?= =?iso-8859-1?Q?n1jJwX8W+YkbPWP+I2gYYZyW7gczwh2ScQ2eDaE8F9xCg=3D=3D?= x-microsoft-antispam-prvs: x-forefront-prvs: 0954EE4910 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(366004)(136003)(376002)(396003)(199004)(51874003)(189003)(105586002)(33656002)(5640700003)(256004)(2501003)(478600001)(19627405001)(5660300002)(55016002)(6436002)(74482002)(9686003)(106356001)(2351001)(4744005)(53936002)(25786009)(71200400001)(68736007)(6916009)(54896002)(105004)(66066001)(99286004)(2906002)(71190400001)(86362001)(81166006)(486006)(8676002)(102836004)(1730700003)(7696005)(186003)(55236004)(97736004)(26005)(476003)(81156014)(6116002)(786003)(316002)(14454004)(3846002)(8936002)(7736002)(74316002)(6506007); DIR:OUT; SFP:1102; SCL:1; SRVR:AM6PR01MB5191; H:AM6PR01MB4440.eurprd01.prod.exchangelabs.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: ucl.ac.uk does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: Rd0xZ+60EDrb53GzYahdKbwM9JhOfkE262nDnX9Bnos/d639opDDFH2qlgkC3TgsN8XIinr6RxAOkHLkfXQApAAtXDKwQDEzTeEWeIqXOHQxhOTwPIuOujtVAZzgxKCT76pQK5oGkPaLL+ww/Qiwd4OAJGAqOwPZnpIuUPVI9UW0eIcxmJqhYnQ3kJ/KZSRv1fKp0TL+kYhi1brUiD4hZBeTTKPpPwzsLvnibmN0MYAXYgJFk24tmXrWhI2iX2oxPwTmbFIJzWzUEvEMowBiRBAXsAetZkNJGQ3Hlwlk78IL3ACJB1tKXeZPYvMBzk35hf1WjRPHhJ9dVmv/X3++usxoIteMIauBeiklv9tUeuKc8TO/SbU63gEzhmPa1s6Os+2NcZuUOwz2IRfX6jsiu3WVoMm9Sc62xTVYyVd9spg= Content-Type: multipart/alternative; boundary="_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_" MIME-Version: 1.0 X-OriginatorOrg: ucl.ac.uk X-MS-Exchange-CrossTenant-Network-Message-Id: e1d3dfaf-c418-4d4d-0986-08d6978ebd80 X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Feb 2019 23:54:23.8858 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 1faf88fe-a998-4c5b-93c9-210a11d9a5c2 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR01MB5191 Archived-At: Subject: [hackathon] Invitation letters for visa purposes? X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Feb 2019 23:54:29 -0000 --_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi there, I've registered for the IETF Hackathon Montreal in July and am looking forw= ard to participate in the event. Since I require Visa to travel to Canada, = I was wondering whether we would be able to get an official invitation lett= er at some point (right now you can't click on the invitation letter option= on the website). I remember last year (Montreal 102 event by Juniper and others) there was = an option on the website that would automatically generate invitation lette= rs for you. Thanks in advance, Saman --_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Hi there, 

I've registered for the IETF Hackathon Montreal in July and am looking forw= ard to participate in the event. Since I require Visa to travel to Canada, = I was wondering whether we would be able to get an official invitation lett= er at some point (right now you can't click on the invitation letter option on the website).

 I remember last year (Montreal 102 event by Juniper and others) there= was an option on the website that would automatically generate invitation = letters for you.

Thanks in advance, 
Saman 
--_000_AM6PR01MB44406CB283313AC4E465F9F9FD7D0AM6PR01MB4440eurp_-- From nobody Wed Feb 20 16:21:14 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30603130E9C for ; Wed, 20 Feb 2019 16:21:13 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.199 X-Spam-Level: X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XQYf5tcoOOry for ; Wed, 20 Feb 2019 16:21:11 -0800 (PST) Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 675C6130E2F for ; Wed, 20 Feb 2019 16:21:11 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 421E11C5ACB; Wed, 20 Feb 2019 16:20:59 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X7MhhpBgJsvl; Wed, 20 Feb 2019 16:20:59 -0800 (PST) Received: from [192.168.0.104] (47-208-183-54.trckcmtc01.res.dyn.suddenlink.net [47.208.183.54]) by c8a.amsl.com (Postfix) with ESMTPSA id E06781C55DD; Wed, 20 Feb 2019 16:20:58 -0800 (PST) From: Alexa Morris Message-Id: <5E208ED9-DD02-4A66-90CD-C13C02FFD585@amsl.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA" Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Date: Wed, 20 Feb 2019 16:21:09 -0800 In-Reply-To: Cc: "hackathon@ietf.org" To: "Rajaei, Saman" References: X-Mailer: Apple Mail (2.3445.9.1) Archived-At: Subject: Re: [hackathon] Invitation letters for visa purposes? X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Feb 2019 00:21:13 -0000 --Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi Saman, I=E2=80=99m delighted to hear that you plan to attend the IETF 105 = Hackathon in Montreal. Registration is not yet open for the IETF 105 = Hackathon =E2=80=94 did you perhaps register for the 104 Hackathon, = taking place in Prague this March, by mistake?=20 Either way, we will definitely be providing letters of invitation for = IETF 105, and for the IETF 105 Hackathon. We are preparing them now, and = they will be ready no later than the week of April 29 (when registration = opens). Regards, Alexa > On Feb 20, 2019, at 3:54 PM, Rajaei, Saman = wrote: >=20 > Hi there,=20 >=20 > I've registered for the IETF Hackathon Montreal in July and am looking = forward to participate in the event. Since I require Visa to travel to = Canada, I was wondering whether we would be able to get an official = invitation letter at some point (right now you can't click on the = invitation letter option on the website). >=20 > I remember last year (Montreal 102 event by Juniper and others) there = was an option on the website that would automatically generate = invitation letters for you. >=20 > Thanks in advance,=20 > Saman=20 > _______________________________________________ > hackathon mailing list > hackathon@ietf.org > https://www.ietf.org/mailman/listinfo/hackathon = --Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Hi = Saman,

I=E2=80=99m = delighted to hear that you plan to attend the IETF 105 Hackathon in = Montreal. Registration is not yet open for the IETF 105 Hackathon =E2=80=94= did you perhaps register for the 104 Hackathon, taking place in Prague = this March, by mistake? 

Either way, we will definitely be = providing letters of invitation for IETF 105, and for the IETF 105 = Hackathon. We are preparing them now, and they will be ready no later = than the week of April 29 (when registration opens).

Regards,
Alexa

On Feb 20, 2019, at 3:54 PM, Rajaei, Saman = <s.rajaei.17@ucl.ac.uk> wrote:

Hi there, 

I've registered for the IETF = Hackathon Montreal in July and am looking forward to participate in the = event. Since I require Visa to travel to Canada, I was wondering whether = we would be able to get an official invitation letter at some point = (right now you can't click on the invitation letter option on the = website).

 I remember last year = (Montreal 102 event by Juniper and others) there was an option on the = website that would automatically generate invitation letters for = you.

Thanks in = advance, 
Saman 
_______________________________________________
hackathon mailing list
hackathon@ietf.org
https://www.ietf.org/mailman/listinfo/hackathon

= --Apple-Mail=_9F115DFE-51E9-4DD4-8EE8-E55FC1A243BA-- From nobody Fri Feb 22 02:31:18 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADDC0129524; Fri, 22 Feb 2019 02:31:10 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.3 X-Spam-Level: X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=aalto.fi Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cjdUs3wJADBF; Fri, 22 Feb 2019 02:31:07 -0800 (PST) Received: from smtp-out-01.aalto.fi (smtp-out-01.aalto.fi [130.233.228.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F54D128CB7; Fri, 22 Feb 2019 02:31:07 -0800 (PST) Received: from smtp-out-01.aalto.fi (localhost.localdomain [127.0.0.1]) by localhost (Email Security Appliance) with SMTP id 64E4F1156F9_C6FCE46B; Fri, 22 Feb 2019 10:26:14 +0000 (GMT) Received: from exng4.org.aalto.fi (exng4.org.aalto.fi [130.233.223.23]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (Client CN "exng4.org.aalto.fi", Issuer "org.aalto.fi RootCA" (not verified)) by smtp-out-01.aalto.fi (Sophos Email Appliance) with ESMTPS id 02ABE115532_C6FCE46F; Fri, 22 Feb 2019 10:26:14 +0000 (GMT) Received: from [130.233.193.86] (130.233.0.5) by exng4.org.aalto.fi (130.233.223.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Fri, 22 Feb 2019 12:31:01 +0200 From: Aleksi Peltonen To: , CC: Message-ID: <30e0a051-f492-35d8-ebf3-57fefacb01e3@aalto.fi> Date: Fri, 22 Feb 2019 12:30:56 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="------------9D6F113EB7B5E6621185F202" Content-Language: en-US X-Originating-IP: [130.233.0.5] X-ClientProxiedBy: exng8.org.aalto.fi (130.233.223.27) To exng4.org.aalto.fi (130.233.223.23) X-SASI-RCODE: 200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aalto.fi; h=from:subject:to:cc:message-id:date:mime-version:content-type; s=its18; bh=1PbdK+mdSs/wfLEcFmEs/oHmOyexGNgRZAi0TJn5Log=; b=hRE2kfiluWWIu/2tyjx9wgpaAKyEnkIkALHRa1HHTVbxZmW4djD8d/LsH6quq3rfzVlOui+rKm+SlSgKMskxNng4859FGAXgH2fyivwdlX8QakM5oyIGhG0/8ck0gy5nViOx9gzin0f3Zv9vvoqGUPhZ4XP8Zc4YPEjELF3cqmsuU/fwU0aK7Gz8tjHVlI/TzGKnaJa93VKY7/Ltnkg+GNKLe2ywZzlOlB1fpWmH90KP1mEtCrEztBKW8LKBwgu/wcx+rO47ficcXPwM04UbqI7GUHM0riSekpH+dcTs2BXd8CmQPafF0BG5p7MUGwCBMkT2lQmSlex1iHhdcxOTdw== Archived-At: Subject: [hackathon] EAP-NOOB at the IETF 104 hackathon X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Feb 2019 10:31:11 -0000 --------------9D6F113EB7B5E6621185F202 Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit Dear all, My colleagues and I will be working on the EAP-NOOB protocol during the hackathon. Feel free to join our table! Please find the project details below or in the hackathon wiki https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon. * Champions: o Aleksi Peltonen o Eduardo Inglés Sánchez o Tuomas Aura * Project: o EAP-NOOB + EAP-NOOB is an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the server and peer. + It is intended as a generic bootstrapping solution for Internet-of-Things devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server. Consider devices you just bought or borrowed. o Working open source implementation with wpa_supplicant and hostapd on github: https://github.com/tuomaura/eap-noob o During the hackathon we plan to work on the following: + Various bug fixes + Interop testing between implementations + Testing the code with new kinds of IoT devices and OOB channels such as audio + User experience in real deployment Regards, Aleksi --------------9D6F113EB7B5E6621185F202 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: 8bit

Dear all,

My colleagues and I will be working on the EAP-NOOB protocol during the hackathon. Feel free to join our table!

Please find the project details below or in the hackathon wiki https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon.

  • Champions:
    • Aleksi Peltonen <aleksi.peltonen at aalto.fi>
    • Eduardo Inglés Sánchez <eduardo.ingles at um.es>
    • Tuomas Aura <tuomas.aura at aalto.fi>
  • Project:
    • EAP-NOOB
      • EAP-NOOB is an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the server and peer.
      • It is intended as a generic bootstrapping solution for Internet-of-Things devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server. Consider devices you just bought or borrowed.
    • Working open source implementation with wpa_supplicant and hostapd on github: https://github.com/tuomaura/eap-noob
    • During the hackathon we plan to work on the following:
      • Various bug fixes
      • Interop testing between implementations
      • Testing the code with new kinds of IoT devices and OOB channels such as audio
      • User experience in real deployment
Regards,
Aleksi
--------------9D6F113EB7B5E6621185F202-- From nobody Fri Feb 22 05:34:12 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB861128766 for ; Fri, 22 Feb 2019 05:34:10 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.501 X-Spam-Level: X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ye-KozmS5fBt for ; Fri, 22 Feb 2019 05:34:09 -0800 (PST) Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2390712426E for ; Fri, 22 Feb 2019 05:34:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17458; q=dns/txt; s=iport; t=1550842449; x=1552052049; h=from:to:cc:subject:date:message-id:mime-version; bh=d0s8c3M9aPl16vJJHN2+oAux6F895uJgW7n+gGPS8XA=; b=lgyEbv4SFIO5+WXLj3nV7vL7I/Zs2yyISUbAuI8QCumCEC1HXsohpqHi fH2kQNyl6M5XlPXEEm6OJ8++XmICuCCBPs+AtLF11QPXDD+k+C1yinVY9 amvgYgAXPPnUgEH4aDTPrJeCWg2u5exLCzFiBCmZ/x4CNcJyectmowEXA U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AnAABm+W9c/40NJK1lHAEBAQQBAQc?= =?us-ascii?q?EAQGBUQcBAQsBgQ12Z4EDJwqDfYgaoA2FcYF7CwEBI4RJGYNnIjQJDQEDAQE?= =?us-ascii?q?CAQECbRwBC4V0VhIBSgIEMCcEDoMlAYEOZA+rOoEvhC8BE0FAhGqMSBeBQD+?= =?us-ascii?q?BEScfgkyBQYFdAgMBgUdUgksxgiYCkDKHGowNCQKHPIsiGYJJkEaKToUPQYw?= =?us-ascii?q?+AhEUgSgfOIFWcBVlAYJBCYIrg1aCZIIwhT9BMY5sgR8BAQ?= X-IronPort-AV: E=Sophos;i="5.58,399,1544486400"; d="scan'208,217";a="240364106" Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Feb 2019 13:34:08 +0000 Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id x1MDY8sL011547 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Feb 2019 13:34:08 GMT Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 22 Feb 2019 07:34:07 -0600 Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1395.000; Fri, 22 Feb 2019 07:34:07 -0600 From: "Luca Muscariello (lumuscar)" To: "hackathon@ietf.org" CC: "hicn-dev@lists.fd.io" Thread-Topic: hICN project at IETF 104 hackathon Thread-Index: AQHUyrNIGVI8U4JJHUmBqIMizyMexQ== Date: Fri, 22 Feb 2019 13:34:07 +0000 Message-ID: <451AB404-DA41-497D-A7BF-F1CF33501A66@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/10.15.0.190117 x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.228.40.37] Content-Type: multipart/alternative; boundary="_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_" MIME-Version: 1.0 X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com X-Outbound-Node: alln-core-8.cisco.com Archived-At: Subject: [hackathon] hICN project at IETF 104 hackathon X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Feb 2019 13:34:11 -0000 --_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgZXZlcnlvbmUsDQoNCldl4oCZbGwgYmUgd29ya2luZyBvbiB0aGUgaGljbiBwcm9qZWN0IGR1 cmluZyBJRVRGIDEwNCBoYWNrYXRob24uDQpGZWVsIGZyZWUgdG8gam9pbiB1cy4NCg0KVGhlIHBy b2plY3QgZGVzY3JpcHRpb24gaXMgYXZhaWxhYmxlIG9uIHRoZSB3aWtpIHBhZ2UgYW5kIGFsc28N Cg0KcmVwb3J0ZWQgYmVsb3cuDQoNCg0KaHR0cHM6Ly90cmFjLmlldGYub3JnL3RyYWMvaWV0Zi9t ZWV0aW5nL3dpa2kvMTA0aGFja2F0aG9uDQoNCg0KU2VlIHlvdSBpbiBQcmFndWUuDQpCZXN0DQpM dWNhDQoNCg0KSHlicmlkIElDTiAoaElDTikNCg0KICAqICAgQ2hhbXBpb24ocyk6DQogICAgICog ICBMdWNhIE11c2NhcmllbGxvIDxsdW11c2NhcitmZGlvIGF0IGNpc2NvLmNvbT4NCiAgKiAgIFBy b2plY3Q6DQogICAgICogICBUZXN0aW5nIElFVEYtWUFORyBmb3IgaElDTiBWUFAgYmluYXJ5IEFQ SSBwbHVnaW4gdXNpbmcgT0RML3N5c3JlcG8vc3dlZXRjb21iDQogICAgICogICBJbnRlZ3JhdGlv biBvZiBBcGFjaGUgVHJhZmZpYyBTZXJ2ZXIgaElDTiBwbHVnaW4gZm9yIEhMUy9EQVNIIHN0cmVh bWluZyBvdmVyIGhJQ04gcmVsaWFibGUgdHJhbnNwb3J0Lg0KICAgICAqICAgVGVzdGluZyBUTFMg aW50ZWdyYXRpb24gb3ZlciBoSUNOIHJlbGlhYmxlIHNvY2tldC4NCiAgICAgKiAgIFRlc3Rpbmcg RFRMUyBpbnRlZ3JhdGlvbiBvdmVyIGhJQ04gdW5yZWxpYWJsZSBzb2NrZXQuDQogICogICBSZWZl cmVuY2VzOg0KICAgICAqICAg4oCLaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJh ZnQtbXVzY2FyaWVsbG8taW50YXJlYS1oaWNuLzxodHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9kcmFmdC1tdXNjYXJpZWxsby1pbnRhcmVhLWhpY24vPg0KICAgICAqICAg4oCLaHR0cHM6 Ly93aWtpLmZkLmlvL3ZpZXcvSElDTjxodHRwczovL3dpa2kuZmQuaW8vdmlldy9ISUNOPg0KICAg ICAqICAg4oCLaHR0cHM6Ly93aWtpLmZkLmlvL3ZpZXcvVlBQPGh0dHBzOi8vd2lraS5mZC5pby92 aWV3L1ZQUD4NCiAgICAgKiAgIOKAi2h0dHBzOi8vZ2l0aHViLmNvbS9zeXNyZXBvL3N5c3JlcG88 aHR0cHM6Ly9naXRodWIuY29tL3N5c3JlcG8vc3lzcmVwbz4NCiAgICAgKiAgIOKAi2h0dHBzOi8v d2lraS5mZC5pby92aWV3L1N3ZWV0Y29tYjxodHRwczovL3dpa2kuZmQuaW8vdmlldy9Td2VldGNv bWI+DQoNCg== --_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseTpDb3VyaWVyOw0KCXBhbm9zZS0xOjAgMCAwIDAgMCAwIDAgMCAwIDA7 fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpXaW5nZGluZ3M7DQoJcGFub3NlLTE6NSAwIDAg MCAwIDAgMCAwIDAgMDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJDYW1icmlhIE1hdGgi Ow0KCXBhbm9zZS0xOjIgNCA1IDMgNSA0IDYgMyAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZh bWlseTpDYWxpYnJpOw0KCXBhbm9zZS0xOjIgMTUgNSAyIDIgMiA0IDMgMiA0O30NCkBmb250LWZh Y2UNCgl7Zm9udC1mYW1pbHk6VmVyZGFuYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIg NDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwg ZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglm b250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCmE6 bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9y OiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQphOnZpc2l0ZWQsIHNwYW4u TXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9yOiM5 NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpzcGFuLkVtYWlsU3R5bGUxNw0K CXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1jb21wb3NlOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp IixzYW5zLXNlcmlmOw0KCWNvbG9yOndpbmRvd3RleHQ7fQ0Kc3Bhbi5pY29uDQoJe21zby1zdHls ZS1uYW1lOmljb247fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9u bHk7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1hcmdp bjo3MC44NXB0IDcwLjg1cHQgNzAuODVwdCA3MC44NXB0O30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7 cGFnZTpXb3JkU2VjdGlvbjE7fQ0KLyogTGlzdCBEZWZpbml0aW9ucyAqLw0KQGxpc3QgbDANCgl7 bXNvLWxpc3QtaWQ6MTg4MDcwMDk0NDsNCgltc28tbGlzdC10ZW1wbGF0ZS1pZHM6MjA2ODYwNjE4 O30NCkBsaXN0IGwwOmxldmVsMQ0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpidWxsZXQ7DQoJ bXNvLWxldmVsLXRleHQ674K3Ow0KCW1zby1sZXZlbC10YWItc3RvcDozNi4wcHQ7DQoJbXNvLWxl dmVsLW51bWJlci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0xOC4wcHQ7DQoJbXNvLWFu c2ktZm9udC1zaXplOjEwLjBwdDsNCglmb250LWZhbWlseTpTeW1ib2w7fQ0KQGxpc3QgbDA6bGV2 ZWwyDQoJe21zby1sZXZlbC1udW1iZXItZm9ybWF0OmJ1bGxldDsNCgltc28tbGV2ZWwtdGV4dDpv Ow0KCW1zby1sZXZlbC10YWItc3RvcDo3Mi4wcHQ7DQoJbXNvLWxldmVsLW51bWJlci1wb3NpdGlv bjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0xOC4wcHQ7DQoJbXNvLWFuc2ktZm9udC1zaXplOjEwLjBw dDsNCglmb250LWZhbWlseToiQ291cmllciBOZXciOw0KCW1zby1iaWRpLWZvbnQtZmFtaWx5OiJU aW1lcyBOZXcgUm9tYW4iO30NCkBsaXN0IGwwOmxldmVsMw0KCXttc28tbGV2ZWwtbnVtYmVyLWZv cm1hdDpidWxsZXQ7DQoJbXNvLWxldmVsLXRleHQ674KnOw0KCW1zby1sZXZlbC10YWItc3RvcDox MDguMHB0Ow0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDot MTguMHB0Ow0KCW1zby1hbnNpLWZvbnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6V2luZ2Rp bmdzO30NCkBsaXN0IGwwOmxldmVsNA0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpidWxsZXQ7 DQoJbXNvLWxldmVsLXRleHQ674KnOw0KCW1zby1sZXZlbC10YWItc3RvcDoxNDQuMHB0Ow0KCW1z by1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotMTguMHB0Ow0KCW1z by1hbnNpLWZvbnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6V2luZ2RpbmdzO30NCkBsaXN0 IGwwOmxldmVsNQ0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpidWxsZXQ7DQoJbXNvLWxldmVs LXRleHQ674KnOw0KCW1zby1sZXZlbC10YWItc3RvcDoxODAuMHB0Ow0KCW1zby1sZXZlbC1udW1i ZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotMTguMHB0Ow0KCW1zby1hbnNpLWZvbnQt c2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6V2luZ2RpbmdzO30NCkBsaXN0IGwwOmxldmVsNg0K CXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpidWxsZXQ7DQoJbXNvLWxldmVsLXRleHQ674KnOw0K CW1zby1sZXZlbC10YWItc3RvcDoyMTYuMHB0Ow0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246 bGVmdDsNCgl0ZXh0LWluZGVudDotMTguMHB0Ow0KCW1zby1hbnNpLWZvbnQtc2l6ZToxMC4wcHQ7 DQoJZm9udC1mYW1pbHk6V2luZ2RpbmdzO30NCkBsaXN0IGwwOmxldmVsNw0KCXttc28tbGV2ZWwt bnVtYmVyLWZvcm1hdDpidWxsZXQ7DQoJbXNvLWxldmVsLXRleHQ674KnOw0KCW1zby1sZXZlbC10 YWItc3RvcDoyNTIuMHB0Ow0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0 LWluZGVudDotMTguMHB0Ow0KCW1zby1hbnNpLWZvbnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1p bHk6V2luZ2RpbmdzO30NCkBsaXN0IGwwOmxldmVsOA0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1h dDpidWxsZXQ7DQoJbXNvLWxldmVsLXRleHQ674KnOw0KCW1zby1sZXZlbC10YWItc3RvcDoyODgu MHB0Ow0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotMTgu MHB0Ow0KCW1zby1hbnNpLWZvbnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6V2luZ2Rpbmdz O30NCkBsaXN0IGwwOmxldmVsOQ0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDpidWxsZXQ7DQoJ bXNvLWxldmVsLXRleHQ674KnOw0KCW1zby1sZXZlbC10YWItc3RvcDozMjQuMHB0Ow0KCW1zby1s ZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotMTguMHB0Ow0KCW1zby1h bnNpLWZvbnQtc2l6ZToxMC4wcHQ7DQoJZm9udC1mYW1pbHk6V2luZ2RpbmdzO30NCm9sDQoJe21h cmdpbi1ib3R0b206MGNtO30NCnVsDQoJe21hcmdpbi1ib3R0b206MGNtO30NCi0tPjwvc3R5bGU+ DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJGUiIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIi Pg0KPGRpdiBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTpDb3VyaWVy Ij5IaSBldmVyeW9uZSw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6 Q291cmllciI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5 OkNvdXJpZXIiPldl4oCZbGwgYmUgd29ya2luZyBvbiB0aGUgaGljbiBwcm9qZWN0IGR1cmluZyBJ RVRGIDEwNCBoYWNrYXRob24uPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt aWx5OkNvdXJpZXIiPkZlZWwgZnJlZSB0byBqb2luIHVzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTpDb3VyaWVyIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6Q291cmllciI+VGhlIHByb2plY3QgZGVzY3JpcHRpb24gaXMg YXZhaWxhYmxlIG9uIHRoZSB3aWtpIHBhZ2UgYW5kIGFsc28NCjwvc3Bhbj48c3BhbiBsYW5nPSJF Ti1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OkNv dXJpZXIiPnJlcG9ydGVkIGJlbG93LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250 LWZhbWlseTpDb3VyaWVyIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0i TXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9u dC1mYW1pbHk6Q291cmllciI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv bnQtZmFtaWx5OkNvdXJpZXIiPjxhIGhyZWY9Imh0dHBzOi8vdHJhYy5pZXRmLm9yZy90cmFjL2ll dGYvbWVldGluZy93aWtpLzEwNGhhY2thdGhvbiI+aHR0cHM6Ly90cmFjLmlldGYub3JnL3RyYWMv aWV0Zi9tZWV0aW5nL3dpa2kvMTA0aGFja2F0aG9uPC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdDtmb250LWZhbWlseTpDb3VyaWVyIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6 ZToxMS4wcHQ7Zm9udC1mYW1pbHk6Q291cmllciI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNp emU6MTEuMHB0O2ZvbnQtZmFtaWx5OkNvdXJpZXIiPlNlZSB5b3UgaW4gUHJhZ3VlLjxvOnA+PC9v OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz dHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTpDb3VyaWVyIj5CZXN0PG86cD48L286 cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0 eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OkNvdXJpZXIiPkx1Y2E8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5 bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6Q291cmllciI+PG86cD4mbmJzcDs8L286 cD48L3NwYW4+PC9wPg0KPHAgc3R5bGU9ImJhY2tncm91bmQ6d2hpdGUiPjxzdHJvbmc+PHNwYW4g c3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VmVyZGFuYSZxdW90Oyxz YW5zLXNlcmlmO2NvbG9yOmJsYWNrIj5IeWJyaWQgSUNOIChoSUNOKTwvc3Bhbj48L3N0cm9uZz48 c3BhbiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtWZXJkYW5hJnF1 b3Q7LHNhbnMtc2VyaWY7Y29sb3I6YmxhY2siPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjx1bCB0 eXBlPSJkaXNjIj4NCjxsaSBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0iY29sb3I6YmxhY2s7bXNv LW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG87bXNvLWxpc3Q6 bDAgbGV2ZWwxIGxmbzE7YmFja2dyb3VuZDp3aGl0ZSI+DQo8c3BhbiBsYW5nPSJFTi1VUyIgc3R5 bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VmVyZGFuYSZxdW90OyxzYW5z LXNlcmlmIj5DaGFtcGlvbihzKTo8bzpwPjwvbzpwPjwvc3Bhbj4NCjx1bCB0eXBlPSJjaXJjbGUi Pg0KPGxpIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJjb2xvcjpibGFjazttc28tbWFyZ2luLXRv cC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0bzttc28tbGlzdDpsMCBsZXZlbDIg bGZvMTtiYWNrZ3JvdW5kOndoaXRlIj4NCjxzcGFuIGxhbmc9IklUIiBzdHlsZT0iZm9udC1zaXpl OjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtWZXJkYW5hJnF1b3Q7LHNhbnMtc2VyaWYiPkx1Y2Eg TXVzY2FyaWVsbG8gJmx0O2x1bXVzY2FyJiM0MztmZGlvIGF0IGNpc2NvLmNvbSZndDs8bzpwPjwv bzpwPjwvc3Bhbj48L2xpPjwvdWw+DQo8L2xpPjxsaSBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i Y29sb3I6YmxhY2s7bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0 OmF1dG87bXNvLWxpc3Q6bDAgbGV2ZWwxIGxmbzE7YmFja2dyb3VuZDp3aGl0ZSI+DQo8c3BhbiBs YW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VmVy ZGFuYSZxdW90OyxzYW5zLXNlcmlmIj5Qcm9qZWN0OjxvOnA+PC9vOnA+PC9zcGFuPg0KPHVsIHR5 cGU9ImNpcmNsZSI+DQo8bGkgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9ImNvbG9yOmJsYWNrO21z by1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvO21zby1saXN0 OmwwIGxldmVsMiBsZm8xO2JhY2tncm91bmQ6d2hpdGUiPg0KPHNwYW4gbGFuZz0iRU4tVVMiIHN0 eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1ZlcmRhbmEmcXVvdDssc2Fu cy1zZXJpZiI+VGVzdGluZyBJRVRGLVlBTkcgZm9yIGhJQ04gVlBQIGJpbmFyeSBBUEkgcGx1Z2lu IHVzaW5nIE9ETC9zeXNyZXBvL3N3ZWV0Y29tYjxvOnA+PC9vOnA+PC9zcGFuPjwvbGk+PGxpIGNs YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJjb2xvcjpibGFjazttc28tbWFyZ2luLXRvcC1hbHQ6YXV0 bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0bzttc28tbGlzdDpsMCBsZXZlbDIgbGZvMTtiYWNr Z3JvdW5kOndoaXRlIj4NCjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBw dDtmb250LWZhbWlseTomcXVvdDtWZXJkYW5hJnF1b3Q7LHNhbnMtc2VyaWYiPkludGVncmF0aW9u IG9mIEFwYWNoZSBUcmFmZmljIFNlcnZlciBoSUNOIHBsdWdpbiBmb3IgSExTL0RBU0ggc3RyZWFt aW5nIG92ZXIgaElDTiByZWxpYWJsZSB0cmFuc3BvcnQuPG86cD48L286cD48L3NwYW4+PC9saT48 bGkgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9ImNvbG9yOmJsYWNrO21zby1tYXJnaW4tdG9wLWFs dDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvO21zby1saXN0OmwwIGxldmVsMiBsZm8x O2JhY2tncm91bmQ6d2hpdGUiPg0KPHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6 MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1ZlcmRhbmEmcXVvdDssc2Fucy1zZXJpZiI+VGVzdGlu ZyBUTFMgaW50ZWdyYXRpb24gb3ZlciBoSUNOIHJlbGlhYmxlIHNvY2tldC48bzpwPjwvbzpwPjwv c3Bhbj48L2xpPjxsaSBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0iY29sb3I6YmxhY2s7bXNvLW1h cmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG87bXNvLWxpc3Q6bDAg bGV2ZWwyIGxmbzE7YmFja2dyb3VuZDp3aGl0ZSI+DQo8c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9 ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VmVyZGFuYSZxdW90OyxzYW5zLXNl cmlmIj5UZXN0aW5nIERUTFMgaW50ZWdyYXRpb24gb3ZlciBoSUNOIHVucmVsaWFibGUgc29ja2V0 LjxvOnA+PC9vOnA+PC9zcGFuPjwvbGk+PC91bD4NCjwvbGk+PGxpIGNsYXNzPSJNc29Ob3JtYWwi IHN0eWxlPSJjb2xvcjpibGFjazttc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJv dHRvbS1hbHQ6YXV0bzttc28tbGlzdDpsMCBsZXZlbDEgbGZvMTtiYWNrZ3JvdW5kOndoaXRlIj4N CjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom cXVvdDtWZXJkYW5hJnF1b3Q7LHNhbnMtc2VyaWYiPlJlZmVyZW5jZXM6PG86cD48L286cD48L3Nw YW4+DQo8dWwgdHlwZT0iY2lyY2xlIj4NCjxsaSBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0iY29s b3I6YmxhY2s7bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1 dG87bXNvLWxpc3Q6bDAgbGV2ZWwyIGxmbzE7YmFja2dyb3VuZDp3aGl0ZSI+DQo8c3BhbiBsYW5n PSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VmVyZGFu YSZxdW90OyxzYW5zLXNlcmlmIj48YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3Jn L2RvYy9kcmFmdC1tdXNjYXJpZWxsby1pbnRhcmVhLWhpY24vIj48c3BhbiBjbGFzcz0iaWNvbiI+ PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiZxdW90O0FyaWFsJnF1b3Q7LHNhbnMtc2VyaWY7Y29s b3I6I0JCMDAwMDt0ZXh0LWRlY29yYXRpb246bm9uZSI+4oCLPC9zcGFuPjwvc3Bhbj48c3BhbiBz dHlsZT0iY29sb3I6I0JCMDAwMCI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJh ZnQtbXVzY2FyaWVsbG8taW50YXJlYS1oaWNuLzwvc3Bhbj48L2E+PG86cD48L286cD48L3NwYW4+ PC9saT48bGkgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9ImNvbG9yOmJsYWNrO21zby1tYXJnaW4t dG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvO21zby1saXN0OmwwIGxldmVs MiBsZm8xO2JhY2tncm91bmQ6d2hpdGUiPg0KPHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250 LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1ZlcmRhbmEmcXVvdDssc2Fucy1zZXJpZiI+ PGEgaHJlZj0iaHR0cHM6Ly93aWtpLmZkLmlvL3ZpZXcvSElDTiI+PHNwYW4gY2xhc3M9Imljb24i PjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtBcmlhbCZxdW90OyxzYW5zLXNlcmlmO2Nv bG9yOiNCQjAwMDA7dGV4dC1kZWNvcmF0aW9uOm5vbmUiPuKAizwvc3Bhbj48L3NwYW4+PHNwYW4g c3R5bGU9ImNvbG9yOiNCQjAwMDAiPmh0dHBzOi8vd2lraS5mZC5pby92aWV3L0hJQ048L3NwYW4+ PC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvbGk+PGxpIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJj b2xvcjpibGFjazttc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6 YXV0bzttc28tbGlzdDpsMCBsZXZlbDIgbGZvMTtiYWNrZ3JvdW5kOndoaXRlIj4NCjxzcGFuIGxh bmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtWZXJk YW5hJnF1b3Q7LHNhbnMtc2VyaWYiPjxhIGhyZWY9Imh0dHBzOi8vd2lraS5mZC5pby92aWV3L1ZQ UCI+PHNwYW4gY2xhc3M9Imljb24iPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtBcmlh bCZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiNCQjAwMDA7dGV4dC1kZWNvcmF0aW9uOm5vbmUiPuKA izwvc3Bhbj48L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOiNCQjAwMDAiPmh0dHBzOi8vd2lraS5m ZC5pby92aWV3L1ZQUDwvc3Bhbj48L2E+PG86cD48L286cD48L3NwYW4+PC9saT48bGkgY2xhc3M9 Ik1zb05vcm1hbCIgc3R5bGU9ImNvbG9yOmJsYWNrO21zby1tYXJnaW4tdG9wLWFsdDphdXRvO21z by1tYXJnaW4tYm90dG9tLWFsdDphdXRvO21zby1saXN0OmwwIGxldmVsMiBsZm8xO2JhY2tncm91 bmQ6d2hpdGUiPg0KPHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O1ZlcmRhbmEmcXVvdDssc2Fucy1zZXJpZiI+PGEgaHJlZj0iaHR0cHM6 Ly9naXRodWIuY29tL3N5c3JlcG8vc3lzcmVwbyI+PHNwYW4gY2xhc3M9Imljb24iPjxzcGFuIHN0 eWxlPSJmb250LWZhbWlseTomcXVvdDtBcmlhbCZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiNCQjAw MDA7dGV4dC1kZWNvcmF0aW9uOm5vbmUiPuKAizwvc3Bhbj48L3NwYW4+PHNwYW4gc3R5bGU9ImNv bG9yOiNCQjAwMDAiPmh0dHBzOi8vZ2l0aHViLmNvbS9zeXNyZXBvL3N5c3JlcG88L3NwYW4+PC9h PjxvOnA+PC9vOnA+PC9zcGFuPjwvbGk+PGxpIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJjb2xv cjpibGFjazttc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0 bzttc28tbGlzdDpsMCBsZXZlbDIgbGZvMTtiYWNrZ3JvdW5kOndoaXRlIj4NCjxzcGFuIGxhbmc9 IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtWZXJkYW5h JnF1b3Q7LHNhbnMtc2VyaWYiPjxhIGhyZWY9Imh0dHBzOi8vd2lraS5mZC5pby92aWV3L1N3ZWV0 Y29tYiI+PHNwYW4gY2xhc3M9Imljb24iPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtB cmlhbCZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiNCQjAwMDA7dGV4dC1kZWNvcmF0aW9uOm5vbmUi PuKAizwvc3Bhbj48L3NwYW4+PHNwYW4gc3R5bGU9ImNvbG9yOiNCQjAwMDAiPmh0dHBzOi8vd2lr aS5mZC5pby92aWV3L1N3ZWV0Y29tYjwvc3Bhbj48L2E+PG86cD48L286cD48L3NwYW4+PC9saT48 L3VsPg0KPC9saT48L3VsPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OkNvdXJpZXIiPjxvOnA+Jm5ic3A7 PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_451AB404DA41497DA7BFF1CF33501A66ciscocom_-- From nobody Mon Feb 25 17:15:09 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 840AF129C6A; Mon, 25 Feb 2019 17:15:08 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rlR4q9zx8StQ; Mon, 25 Feb 2019 17:15:06 -0800 (PST) Received: from mail-qk1-x743.google.com (mail-qk1-x743.google.com [IPv6:2607:f8b0:4864:20::743]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F843128B14; Mon, 25 Feb 2019 17:15:06 -0800 (PST) Received: by mail-qk1-x743.google.com with SMTP id p15so6626244qkl.5; Mon, 25 Feb 2019 17:15:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:mime-version:date:subject:message-id:to; bh=GEmU0e231G12yE9FbEj2KzhhvBaqoDI+oYoNj/yREM4=; b=r/FxiJhzEIZKN+eFvmgEn06JBwXm+63SDPKBwfPKmhFAVPCwRUszRuuk7CYSVb6+bZ FTqJemV6lwEo1VauyBaECIJ2t6WQBXSG14WwaYwppCW5/sIO3JccZ7WZj2Z7oZgigTJo NX+XtQCwoE/Thz7y6QJLdid0/u7IMb1oFXkNiEqlB7OuQDYiE+K3Rh09pNwNZZYEw+pI xFc88B2VUggQ5wCNR0IXc/pAbGBFCKegM2ZZAHimyFolTMOhLkwr7EW4kUVMtmXFncXw C9gJepEqJJNwXjcpc4KCsTOKWFg16yDR8qt+1WMC601mjq4cflu0g7lH9XPlHft67oJm YFdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:date:subject:message-id:to; bh=GEmU0e231G12yE9FbEj2KzhhvBaqoDI+oYoNj/yREM4=; b=m+rELOXbanf2D/wxt/3DHCf2GDRl7wKISRw3RKA2LIebiAubK4MWc56eSaTZiACDL5 jnG6uo0nPacLGRsN/sH6eohwAGjWvOUq6DLxhkyN5qgzRfAOeURC2aO4OXnL7IkqeviR 9wUiWqby/v/HaEkk1AZZOmQA7vLmvh/JClJ/gYeUUJqe3mh23yEMxYQxVME1qITfQlkY 6ndDDWMWEZ0MHXPJ2btnlJHN5WUB+rx/eY6f7GVTFV+J5BBM1s2dTsVmVa1lTvSDZdiQ J9urgnygyefo4HjfuJdkV4f3/FdYt6hLaiArPg086IIuxa5IcTYbfK5QS2CRDaS2q087 SAIg== X-Gm-Message-State: AHQUAuaWl4+Ll9qrJ4mr6yAH6zLWmfkohuLLoj4HepIvjeq8RACL+kNk YAUkkJ9rSxpXWbNtdzltR5kNQRCQp44= X-Google-Smtp-Source: AHgI3IYpExyJpuL3jpHpdgyfC+J0tdH/ne40iymmAFL3JEm8d7Q/4S0bPVLf2vr9Yw1dK/Bio3ONSw== X-Received: by 2002:a37:4f45:: with SMTP id d66mr15203371qkb.81.1551143704720; Mon, 25 Feb 2019 17:15:04 -0800 (PST) Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id b83sm6466519qkg.12.2019.02.25.17.15.01 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 25 Feb 2019 17:15:03 -0800 (PST) From: Bruno Rijsman Content-Type: multipart/alternative; boundary="Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B" Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Date: Mon, 25 Feb 2019 22:14:59 -0300 Message-Id: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> To: hackathon@ietf.org, rift@ietf.org X-Mailer: Apple Mail (2.3445.9.1) Archived-At: Subject: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2019 01:15:08 -0000 --Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi everyone, =20 At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we will = be working on "chaos monkey" testing of two RIFT implementations: the = RIFT-Python open source implementation and a vendor RIFT implementation. This hackathon is inspired by the concept of chaos engineering and in = particular by the chaos monkey tool, which intentionally and randomly = shuts down servers in a production environment. This is intended to = build confidence in the system's capability to withstand turbulent and = unexpected conditions. In this hackathon we will do something similar for RIFT networks. We = will build a large fat tree network of RIFT routers. Then we will = randomly insert failures into the network and make sure that the network = behaves correctly. We will make sure the RIFT routers don't crash or = otherwise behave badly. And we will make sure that the routers = forwarding tables and link-state databases converge correctly. We will use (and possibly enhance) the chaos testing framework as well = as the visualization and verification tools that are already part of the = RIFT-Python open source project. Even if you are not much interested in the RIFT routing protocol, but = you are interested in testing large network topologies using = container-like technology, or in visualization tools, or in chaos = testing, this might be the right hackathon for you. A detailed description of the planned activities at the hackathon is = available at: http://bit.ly/rift-hackathon-ietf-104 = The project is listed on the IETF 104 hackathon wiki page: = https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon = (info copied = below) =20 Feel free to join us. Bruno Rijsman Routing In Fat Trees (RIFT) Chaos Monkey Testing * Champions * Tony Przygienda (will join in person) * Bruno Rijsman (will join remotely) * Project(s) * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC = routing protocol * =E2=80=8BDetailed description of the planned activities at the = hackathon at=20 http://bit.ly/rift-hackathon-ietf-104 * We have two implementations now: * RIFT-Python open source * Vendor implementation * The open source one has a chaos monkey framework in place we can = use=20 to stress protocol implementations and interoperability between = them.=20 Unusual hackathon but that will be very, very useful for further=20= development and quality of implementations while breaking = completely=20 new grounds (chaos testing on model based protocol = specifications). * Preconditions: * Python knowledge * Familiarity with the open source RIFT code on = =E2=80=8Bhttps://github.com/brunorijsman/rift-python * RIFT Specification in some detail =E2=80=8BRIFT draft * Familiarity with creating virtual machines in AWS --Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8
Hi everyone,
 
At the Routing In Fat Trees (RIFT) IETF 104 hackathon in = Prague we will be working on "chaos monkey" testing of two RIFT = implementations: the RIFT-Python open source implementation and a vendor = RIFT implementation.

This hackathon is inspired by the concept of chaos = engineering and in particular by the chaos monkey tool, which = intentionally and randomly shuts down servers in a production = environment. This is intended to build confidence in the system's = capability to withstand turbulent and unexpected conditions.

In this hackathon we = will do something similar for RIFT networks. We will build a large fat = tree network of RIFT routers. Then we will randomly insert failures into = the network and make sure that the network behaves correctly. We will = make sure the RIFT routers don't crash or otherwise behave badly. And we = will make sure that the routers forwarding tables and link-state = databases converge correctly.

We will use (and possibly enhance) the = chaos testing framework as well as the visualization and verification = tools that are already part of the RIFT-Python open source = project.

Even = if you are not much interested in the RIFT routing protocol, but you are = interested in testing large network topologies using container-like = technology, or in visualization tools, or in chaos testing, this might = be the right hackathon for you.

A detailed description of = the planned activities at the hackathon is available at: http://bit.ly/rift-hackathon-ietf-104

The project is listed on = the IETF 104 hackathon wiki page: https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon&n= bsp;(info copied below)
 
Feel free to join us.

Bruno Rijsman


Routing In Fat Trees (RIFT) Chaos Monkey Testing

* Champions
  * Tony Przygienda <prz at juniper.net> (will join in = person)
  * Bruno Rijsman <brunorijsman at = gmail.com> (will join = remotely)
* Project(s)
  = * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC = routing protocol
  * =E2=80=8BDetailed = description of the planned activities at the hackathon = at 
  * We have two implementations now:
    * RIFT-Python open source
    * Vendor implementation
    * The open source one has a chaos monkey = framework in place we can use 
    =   to stress protocol implementations and interoperability between = them. 
      Unusual hackathon = but that will be very, very useful for further 
      development and quality of = implementations while breaking completely 
      new grounds (chaos testing on model = based protocol specifications).
* = Preconditions:
  * Python knowledge
  * Familiarity with the open source RIFT code on =E2=80=8B= https://github.com/brunorijsman/rift-python
  * RIFT Specification in some detail =E2=80=8BRIFT = draft
  * Familiarity with creating virtual = machines in AWS

= --Apple-Mail=_5B1AF4FC-CE8A-44FB-BCA2-7603D9B4763B-- From nobody Tue Feb 26 07:33:52 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0E69128CB7; Tue, 26 Feb 2019 07:33:49 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MsYRVBIS3kTJ; Tue, 26 Feb 2019 07:33:47 -0800 (PST) Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27F06130E84; Tue, 26 Feb 2019 07:33:47 -0800 (PST) Received: by mail-ed1-x536.google.com with SMTP id b20so11056921edw.11; Tue, 26 Feb 2019 07:33:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sXYC48EZeUSxjcGUPsLwBtrYfyr9K4MJ+X8xqKf7obs=; b=nY5lbQvBXmZTYCBaErvtrgt+MnJVxf0sqYIksnlyfvc0mgCGVxhRW5usFpXrJiMIMY k+KD6Y1jipT2OhyL5LD9ICF3LvMzFeP+u4xBfz4UQCpydrOLRKSoRc2buwZxnQuZZ8SH r9HoDg4dZKe/sKwmIN7mm2YL9KbtjjfdZi5o5lGCPtnBpoW5cPj6E3asesDYhaN6ZbpB c5Za1HQyLvRFxP4xw5S3yxNqMeC2mfVVva3rHqHvb3yqbWUjwKnysqp6Cl8Otr7FrFiZ ITeMwpZ3PHtW1b5kcpNTGXKsI9/dQbhP1CcTd7x+Kq3qMBvPb6l5NoQO56ypcsVBvbaI Ifgw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sXYC48EZeUSxjcGUPsLwBtrYfyr9K4MJ+X8xqKf7obs=; b=CwJD2oDStmxVeIb2FkUz7GcfFut3ug8Rk3dzRuQYiwGR1K01ZoVffWPOH5h3EwNut9 zw3wrq0c6P4FzYLnxvMuHVKA2JXk09YCZMSYvsWOxjxQLFgAPapAeQJ5jpSwZ7PK55RV bor2B+bDCw3q+3rQGFrfypOLCRGj9gwSyGK7LV/hgSFAsNQcCC10tzmytHYatWFwdhVT 1KPg0+yq+V0Ph3KVlVxZJlLUNNxdtTo31RB0VpHjj3vbc8uo9LNEWyYPJNk/m6yz6NZp ACXgHvUlrhXz1HOPZ8zdlebTc6PNSEzDEZyyp2bhKXwudms0PDGQhzull8kxRuvnE40t wouQ== X-Gm-Message-State: AHQUAuaz5HbyRcWfQKwskyrLZFpykKSRDAgwfQweVIhCa5cRu8URYIAp XsMM4u7MQUw/tCBRPE6rmV64o3DYjzweaYDRa7E= X-Google-Smtp-Source: AHgI3Ia3C5V1a0VqCw7gGKNCoS1NLd41xupsEIg/L2ioc6db9kh6TRMN7eJijvt63svNQD4Vrl75W6jVL1CMEIdOxKg= X-Received: by 2002:a50:ad13:: with SMTP id y19mr19357724edc.86.1551195225504; Tue, 26 Feb 2019 07:33:45 -0800 (PST) MIME-Version: 1.0 References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> From: Tony Przygienda Date: Tue, 26 Feb 2019 07:33:09 -0800 Message-ID: To: Bruno Rijsman Cc: hackathon@ietf.org, rift@ietf.org Content-Type: multipart/alternative; boundary="00000000000064bf340582cdc88f" Archived-At: Subject: Re: [hackathon] [Rift] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2019 15:33:50 -0000 --00000000000064bf340582cdc88f Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable I'll be setting up a 16 or so cores AWS account next week that we can use for larger runs during hackathon. For development purposes I think e'one can chuck with a micro freebie ... Ubuntu I assume? thanks --- tony On Mon, Feb 25, 2019 at 5:15 PM Bruno Rijsman wrote: > Hi everyone, > > At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we will b= e > working on "chaos monkey" testing of two RIFT implementations: the > RIFT-Python open source implementation and a vendor RIFT implementation. > > This hackathon is inspired by the concept of chaos engineering and in > particular by the chaos monkey tool, which intentionally and randomly shu= ts > down servers in a production environment. This is intended to build > confidence in the system's capability to withstand turbulent and unexpect= ed > conditions. > > In this hackathon we will do something similar for RIFT networks. We will > build a large fat tree network of RIFT routers. Then we will randomly > insert failures into the network and make sure that the network behaves > correctly. We will make sure the RIFT routers don't crash or otherwise > behave badly. And we will make sure that the routers forwarding tables an= d > link-state databases converge correctly. > > We will use (and possibly enhance) the chaos testing framework as well as > the visualization and verification tools that are already part of the > RIFT-Python open source project. > > Even if you are not much interested in the RIFT routing protocol, but you > are interested in testing large network topologies using container-like > technology, or in visualization tools, or in chaos testing, this might be > the right hackathon for you. > > *A detailed description of the planned activities at the hackathon is > available at: http://bit.ly/rift-hackathon-ietf-104 > * > > The project is listed on the IETF 104 hackathon wiki page: > https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon (info copied > below) > > Feel free to join us. > > Bruno Rijsman > > > Routing In Fat Trees (RIFT) Chaos Monkey Testing > > * Champions > * Tony Przygienda (will join in person) > * Bruno Rijsman (will join remotely) > * Project(s) > * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC rout= ing > protocol > * =E2=80=8BDetailed description of the planned activities at the hackat= hon at > http://bit.ly/rift-hackathon-ietf-104 > * We have two implementations now: > * RIFT-Python open source > * Vendor implementation > * The open source one has a chaos monkey framework in place we can us= e > to stress protocol implementations and interoperability between > them. > Unusual hackathon but that will be very, very useful for further > development and quality of implementations while breaking completel= y > new grounds (chaos testing on model based protocol specifications). > * Preconditions: > * Python knowledge > * Familiarity with the open source RIFT code on =E2=80=8B > https://github.com/brunorijsman/rift-python > * RIFT Specification in some detail =E2=80=8BRIFT draft > * Familiarity with creating virtual machines in AWS > > _______________________________________________ > RIFT mailing list > RIFT@ietf.org > https://www.ietf.org/mailman/listinfo/rift > --00000000000064bf340582cdc88f Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
I'll be setting up a 16 or so cores AWS account n= ext week that we can use for larger runs during hackathon. For development = purposes I think e'one can chuck with a micro freebie ...

Ubuntu I assume?

thanks
=

--- tony

On Mon, Feb 25, 2019 at 5:15 PM= Bruno Rijsman <brunorijsman@g= mail.com> wrote:
Hi everyone,
=C2=A0
At the Routing In Fat Trees (RIFT) IETF 104 hackat= hon in Prague we will be working on "chaos monkey" testing of two= RIFT implementations: the RIFT-Python open source implementation and a ven= dor RIFT implementation.

This hackathon is inspire= d by the concept of chaos engineering and in particular by the chaos monkey= tool, which intentionally and randomly shuts down servers in a production = environment. This is intended to build confidence in the system's capab= ility to withstand turbulent and unexpected conditions.

In this hackathon we will do something similar for RIFT networks. We = will build a large fat tree network of RIFT routers. Then we will randomly = insert failures into the network and make sure that the network behaves cor= rectly. We will make sure the RIFT routers don't crash or otherwise beh= ave badly. And we will make sure that the routers forwarding tables and lin= k-state databases converge correctly.

We will use = (and possibly enhance) the chaos testing framework as well as the visualiza= tion and verification tools that are already part of the RIFT-Python open s= ource project.

Even if you are not much interested= in the RIFT routing protocol, but you are interested in testing large netw= ork topologies using container-like technology, or in visualization tools, = or in chaos testing, this might be the right hackathon for you.
<= br>
A detailed description of the planned activities at the ha= ckathon is available at:=C2=A0http://bit.ly/rift-hackathon-ietf-104
<= div>
The project is listed on the IETF 104 hackathon wiki pag= e:=C2=A0https://trac.ietf.org/trac/ietf/meeting/wiki/104hackat= hon=C2=A0(info copied below)
=C2=A0
Feel free to jo= in us.

Bruno Rijsman


=
Routing In Fat Trees (RIFT) Chaos Monkey Testing

<= /div>
* Champions
=C2=A0 * Tony Przygienda <prz at juniper.net> (will join in= person)
=C2=A0 * Bruno Rijsman <brunorijsman at gmail.com> (will join remotely)
* Project(s)
=C2=A0 * =E2=80=8BRIFT is a STD track WG wor= king on a modern IP fabric/DC routing protocol
=C2=A0 * =E2=80=8B= Detailed description of the planned activities at the hackathon at=C2=A0
=C2=A0 *= We have two implementations now:
=C2=A0 =C2=A0 * RIFT-Python ope= n source
=C2=A0 =C2=A0 * Vendor implementation
=C2=A0 = =C2=A0 * The open source one has a chaos monkey framework in place we can u= se=C2=A0
=C2=A0 =C2=A0 =C2=A0 to stress protocol implementations = and interoperability between them.=C2=A0
=C2=A0 =C2=A0 =C2=A0 Unu= sual hackathon but that will be very, very useful for further=C2=A0
=C2=A0 =C2=A0 =C2=A0 development and quality of implementations while br= eaking completely=C2=A0
=C2=A0 =C2=A0 =C2=A0 new grounds (chaos t= esting on model based protocol specifications).
* Preconditions:<= /div>
=C2=A0 * Python knowledge
=C2=A0 * Familiarity with the= open source RIFT code on =E2=80=8Bhttps://github.com/brunorijsman/rift-pyth= on
=C2=A0 * RIFT Specification in some detail =E2=80=8BRIFT d= raft
=C2=A0 * Familiarity with creating virtual machines in AWS

____________________________________________= ___
RIFT mailing list
RIFT@ietf.org
https://www.ietf.org/mailman/listinfo/rift
--00000000000064bf340582cdc88f-- From nobody Tue Feb 26 07:36:55 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45C07130EA7; Tue, 26 Feb 2019 07:36:54 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.502 X-Spam-Level: X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EBo/zaxU; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gzRUDx53 Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id if6h6aGr5IH5; Tue, 26 Feb 2019 07:36:51 -0800 (PST) Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 486F4130E84; Tue, 26 Feb 2019 07:36:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19805; q=dns/txt; s=iport; t=1551195411; x=1552405011; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=BSWvF8QcagSYpgCVtIxHKmbV4eAoq4y7DCg2DPd8jNc=; b=EBo/zaxUMdbuh9TsS8LbG430pNLBheYMULK4SZDf4PkDjPfF9e8powGg JbxCfF4to5sOtpKYL3LZOGSXuVR6rBeKCNRHH8VFtQKevB3fw8cCIDvmn yddg5o7997SchQbKSRZg7TjTN75smNVZdAF5TxSA/OdThfyrTUNYHju3J w=; IronPort-PHdr: =?us-ascii?q?9a23=3AcvoIjRx7DmBlzk3XCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YhSN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZuIAk72KPX3Ryc7B89FElRi+iLzPA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AsAABfXHVc/51dJa1eBhwBAQEEAQE?= =?us-ascii?q?HBAEBgVEHAQELAYENI1ADZ3QECyeECINHA4RQixFKgg2JLYkAhXGBJANUCwE?= =?us-ascii?q?BIwmEQAIXg2siNAkNAQMBAQIBAQJtHAyFSgEBAQQjHQEBOA8CAQgRAwECKwI?= =?us-ascii?q?CAh8RHQgCBAESgyABgQ5MAxUBAgygOAKKFHGBLx2CWwEBBYEwAYNZDQuCCwi?= =?us-ascii?q?MSBeBf4ERJx+BTn6BQYEWRwKBRQ4uDYJdMYImikCBfYN/hx2LWzMJAodAh2m?= =?us-ascii?q?DPRmBc1iFBYtKilmFVIEuVIo/AgQCBAUCDQEBBYFHOIFWcBVlAYJBCRaBfRg?= =?us-ascii?q?egziDcWg7hT9yGAGBD48bAQE?= X-IronPort-AV: E=Sophos;i="5.58,416,1544486400"; d="scan'208,217";a="522670645" Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Feb 2019 15:36:49 +0000 Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x1QFanPQ021175 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 26 Feb 2019 15:36:49 GMT Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 26 Feb 2019 09:36:49 -0600 Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 26 Feb 2019 10:36:48 -0500 Received: from NAM05-DM3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Tue, 26 Feb 2019 09:36:48 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BSWvF8QcagSYpgCVtIxHKmbV4eAoq4y7DCg2DPd8jNc=; b=gzRUDx53TtBO/l7qAi2whII8uqsop3srboS7OjqYq7Q4vOW/8StSTMkOCW9gmcFaPV8NMF5/Womr07vaaHKtuJezpb+tJEgDIFtbOsaLn28dBUWDO7DnGC2nCNCr/1MJU33HXHxApZeUXmsXg/5DVQm+T6URjeSRspI7c8d/LNc= Received: from DM6PR11MB3547.namprd11.prod.outlook.com (20.178.229.140) by DM6PR11MB3371.namprd11.prod.outlook.com (20.176.122.210) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.21; Tue, 26 Feb 2019 15:36:47 +0000 Received: from DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79]) by DM6PR11MB3547.namprd11.prod.outlook.com ([fe80::95e1:e9e6:f436:ed79%5]) with mapi id 15.20.1643.019; Tue, 26 Feb 2019 15:36:47 +0000 From: "Charles Eckel (eckelcu)" To: Bruno Rijsman , "hackathon@ietf.org" , "rift@ietf.org" Thread-Topic: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague Thread-Index: AQHUzXDM6r0DYyR53UCSXp0VW2v9IaXxsSsA Date: Tue, 26 Feb 2019 15:36:47 +0000 Message-ID: References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/10.16.1.190220 authentication-results: spf=none (sender IP is ) smtp.mailfrom=eckelcu@cisco.com; x-originating-ip: [2001:420:303:1250:59d:b356:298f:24c8] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 828af5be-dc34-4ced-b560-08d69c003811 x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:DM6PR11MB3371; x-ms-traffictypediagnostic: DM6PR11MB3371: x-ms-exchange-purlcount: 5 x-microsoft-exchange-diagnostics: =?utf-8?B?MTtETTZQUjExTUIzMzcxOzIzOmpZclUrVzQ3eUpRWXZGd1R5YjRHenpJcDRM?= =?utf-8?B?TVlNaUFjZDA3VFRIMFBzUThWZm9uc2pZbk5WRGFzWi9YMUlveGF0ays2bmZR?= =?utf-8?B?cFE2NG1mNzlVSHVEbTZNcjZBdnBBMmhuWkRLVTk3SWs0d1AwVzBPa1JmWGFZ?= =?utf-8?B?dGFnRWVNU2pnMFZTcTV2Vk1kbXhvU0dQWDBsMmFvMEpQTjY5N3lnL05uczNT?= =?utf-8?B?NUFUVjlxa3ozcHJLT3F1UFo1dzVMWWVGSkw3alZDQ0FUMXdNblFuVE4wOEVX?= =?utf-8?B?U1g1QlNzSUlIWmE5bVV6U3oxSm9odjhCQjFmck0rOEkzUWs4U1V4bE1UL1M3?= =?utf-8?B?T0prbER3UVpkaGNzU3RBM3RhQmlXQU9ocElYUm5tU1hvMU5NMS8rT2J3MHgw?= =?utf-8?B?MGlOMlV4VlZjbGt5YUEzQ1NsTWYyL1VmUjhTay82ZG9Fc01EQ3ByZGJ2M1B3?= =?utf-8?B?Z1RyRmowME5acXhrc2F3RHJ3UXpUSno0YVhIT0llcjRwSlZnOGhoZG1yQXVv?= =?utf-8?B?V05kYS85emlHU01vZUhPVUUwaDA5QUxTUyt2MmhTZ1kvT2dNcWJzWUl6MGhN?= =?utf-8?B?SDlGYWJFZTM5bERyWXU5dXNBVnVGeHM3Wk9WbUMzY0NJSTYwc3RYMlJsbXRs?= =?utf-8?B?OFlKQnQ3eGp6VFpOZXJFWFNHYmI1UUhZRnhOVmVWZWRsYnFhbENva1JGTmNW?= =?utf-8?B?QkUvbEM0NFkzUWdBRlg3VHcxWElIZDlZZWlidGhXOU1RSko3Q3E5aVVhSEkv?= =?utf-8?B?Mm04WW5ndnFjUy9VQ2Z5bHBjRFpIZ3A2bnJIMmtqUk0yVW5rcUdmdFRuUzho?= =?utf-8?B?ajdlYTlFVnliS1FISjRVa2hKWXBBNzNxTURCVklocEJZbXpnLzNYUUJUanlp?= =?utf-8?B?akQySGRWTXRhTkR4S0dmQWMwc1ZscEp3b0NZendaeEQzcHZSUmd2c1ZISE1R?= =?utf-8?B?TlFsc3Jubkl3aDlOd2gyNTF3QkJxL01sRnBvQTBlcktkQzkwWmNPK3RzYjR2?= =?utf-8?B?S0NnWmI2ZXZkU01ETlhaek1CUTEvMERoT0xWYW5Rb1g0ZmxHVDE3bzdBY1Q5?= =?utf-8?B?T294NVdaNzJVWGMzb3ZjODFMdFNqMFdxWCtFRDFPUXVJcmpDSkRWMlNQcndI?= =?utf-8?B?ZzNPeFA1SEoveXVpK3pjazRJMElOUWxScFphZ2NjZ0pEbVhNRVhqN0Y0Uk42?= =?utf-8?B?QUlrSno3RFA3aDQrSTdpbHhFSk5XNXQ1eUNkUGV3VjJ0dWQzOXV1SmFJdk1x?= =?utf-8?B?T2ZKRDhsenVPc0FMd1RteWRBaDlqRmk3MGVIU3VPSmZQRkVmR3J6aWwrWUhV?= =?utf-8?B?YThhSWZ3QkRlMVUyZmlvYnBLZnA4YlZKMUY4SkVlTmY5U29GcCtpMDJHdC9h?= =?utf-8?B?TDVpVWVWNzFvUlNIWDN2YW03RUNkZnlwTlRYNGFkc3E3VWN0QjYvTDFQdGo1?= =?utf-8?B?SHp0MHd0ZlpYT2NOUUNNMy9tZ1B1MFFaL0xNMi9Bbk8yeGZWQld2RU8xS1FO?= =?utf-8?B?TnVMWW1RMHNrN2gvblR1WTUzdFY0US96ZXp3YUdTdnZWL2ttNDg0eEFOd3Vh?= =?utf-8?B?NVQxWkZ0RWNyaHNMeHd6M3B0Q1dHUEN1cXVVR1BRQng2Wi9RbzU3RFRNTlBy?= =?utf-8?B?eEpiTm1hcitwanpGdkpiT29VWDZ4WXlMSmhudEMwd3J0QmRXNXIrUExvTGlh?= =?utf-8?B?V3VrOVdhRU9HL2lDaHBKL3ZST1doYzVkWmMxSTlxeVlXYVJaYnIrb2U5RmRG?= =?utf-8?B?ZGI2WTBpKzE3U05FVXpRM3RkR0t3eEhhbHBwZHdXQUtPU29GdXgzU3lITDEx?= =?utf-8?B?VE9lQlltbmVFVVhOTllCMzlFdUNNc3hZZXByczRmNkdaYkRPei9Jb25MOU5K?= =?utf-8?B?TDEraTh3Zm50VTRwMS9GbUtPVVVMLzBRdGpjMm5lZURIMUpnRER2dkFiQXdu?= =?utf-8?B?K3ZWMTlsOFlrZm1wVHNuWDdkNU5PNUdCQUVtT3VqUjdsa1d5VHZKcmFjbXJs?= =?utf-8?B?VjJnS1g2Tlh6Ni9LK21rSll5VW1kcXM3UlVLZz09?= x-microsoft-antispam-prvs: x-forefront-prvs: 096029FF66 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(346002)(396003)(136003)(366004)(376002)(199004)(189003)(53754006)(6306002)(54896002)(478600001)(8676002)(606006)(81156014)(81166006)(7736002)(2906002)(110136005)(8936002)(105586002)(316002)(229853002)(25786009)(6436002)(6116002)(58126008)(76176011)(9326002)(68736007)(102836004)(53936002)(966005)(6506007)(6512007)(6486002)(82746002)(5660300002)(53546011)(36756003)(236005)(86362001)(14454004)(14444005)(256004)(97736004)(476003)(11346002)(83716004)(53376002)(53366004)(2201001)(6246003)(2501003)(106356001)(33656002)(71200400001)(71190400001)(186003)(446003)(486006)(2616005)(46003)(99286004)(53386004)(11634002)(493534005)(19477635001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3371; H:DM6PR11MB3547.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: KWLvZL10wdj9ELVjAwWZ3SyNH7nscUuktC544+6cpAU2lXfFRHa9LGLaCUc006yR3SyUtJ7p9dNrmNkiMS5O1DklJYfZ+GHvClsQ+iXu4JoKKyDAryG6lVQyjcCKL25ZP3X853USyhKvjETNhzKLQ6rSKuqhZNLosiIXRvxItAZ2HRSksHr2TRyLZOGLr6/EEF9e56prxvFa0VXmfMBz7rD2v2Dh/1iCef+UHWq1LlFZxtmhgBQ8XkuCdbkYo7KWznRqD6g0ajGlvrqqdZjB3uflsoKbHXRiOOL50Pr1CfQyXEU+/JOeC9EBupmaEDlTXygLXiRS2hahy1QF7ON+J5zwq2M7NOqVlWrzcvO+KArDR9qxtb2jcuBVQf5jhuoydcqtXk8+NR5wlduEHje9qhE/zUN4oeldJZljP4M1dkc= Content-Type: multipart/alternative; boundary="_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: 828af5be-dc34-4ced-b560-08d69c003811 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2019 15:36:47.2840 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3371 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com X-Outbound-Node: rcdn-core-6.cisco.com Archived-At: Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2019 15:36:54 -0000 --_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgQnJ1bm8sDQoNClRoaXMgbG9va3MgbGlrZSBhIGdyZWF0IHByb2plY3QuIFRoYW5rcyBmb3Ig YnJpbmdpbmcgaXQgdG8gdGhlIGhhY2thdGhvbi4NCg0KRG8geW91IGhhdmUgYW55IHNwZWNpYWwg bmV0d29yayByZXF1aXJlbWVudHM/IFBvd2VyIGFuZCBhY2Nlc3MgdG8gdGhlIElFVEYgbmV0d29y ayB2aWEgV2lGaSB3aWxsIGJlIGF2YWlsYWJsZSBhdCBhbGwgdGFibGVzLiBJZiB5b3UgbmVlZCB3 aXJlZCBhY2Nlc3Mgb3IgYW55dGhpbmcgZWxzZSwgcGxlYXNlIGxldCBtZSBrbm93IGFzIHNvb24g YXMgcG9zc2libGUgYW5kIHdlIHdpbGwgZG8gb3VyIGJlc3QgdG8gYWNjb21tb2RhdGUuDQoNCkNo ZWVycywNCkNoYXJsZXMNCg0KRnJvbTogaGFja2F0aG9uIDxoYWNrYXRob24tYm91bmNlc0BpZXRm Lm9yZz4gb24gYmVoYWxmIG9mIEJydW5vIFJpanNtYW4gPGJydW5vcmlqc21hbkBnbWFpbC5jb20+ DQpEYXRlOiBNb25kYXksIEZlYnJ1YXJ5IDI1LCAyMDE5IGF0IDU6MTUgUE0NClRvOiAiaGFja2F0 aG9uQGlldGYub3JnIiA8aGFja2F0aG9uQGlldGYub3JnPiwgInJpZnRAaWV0Zi5vcmciIDxyaWZ0 QGlldGYub3JnPg0KU3ViamVjdDogW2hhY2thdGhvbl0gW1JJRlRdIFJvdXRpbmcgaW4gRmF0IFRy ZWVzICJjaGFvcyB0ZXN0aW5nIiBoYWNrYXRob24gYXQgSUVURiAxMDQgaW4gUHJhZ3VlDQoNCkhp IGV2ZXJ5b25lLA0KDQpBdCB0aGUgUm91dGluZyBJbiBGYXQgVHJlZXMgKFJJRlQpIElFVEYgMTA0 IGhhY2thdGhvbiBpbiBQcmFndWUgd2Ugd2lsbCBiZSB3b3JraW5nIG9uICJjaGFvcyBtb25rZXki IHRlc3Rpbmcgb2YgdHdvIFJJRlQgaW1wbGVtZW50YXRpb25zOiB0aGUgUklGVC1QeXRob24gb3Bl biBzb3VyY2UgaW1wbGVtZW50YXRpb24gYW5kIGEgdmVuZG9yIFJJRlQgaW1wbGVtZW50YXRpb24u DQoNClRoaXMgaGFja2F0aG9uIGlzIGluc3BpcmVkIGJ5IHRoZSBjb25jZXB0IG9mIGNoYW9zIGVu Z2luZWVyaW5nIGFuZCBpbiBwYXJ0aWN1bGFyIGJ5IHRoZSBjaGFvcyBtb25rZXkgdG9vbCwgd2hp Y2ggaW50ZW50aW9uYWxseSBhbmQgcmFuZG9tbHkgc2h1dHMgZG93biBzZXJ2ZXJzIGluIGEgcHJv ZHVjdGlvbiBlbnZpcm9ubWVudC4gVGhpcyBpcyBpbnRlbmRlZCB0byBidWlsZCBjb25maWRlbmNl IGluIHRoZSBzeXN0ZW0ncyBjYXBhYmlsaXR5IHRvIHdpdGhzdGFuZCB0dXJidWxlbnQgYW5kIHVu ZXhwZWN0ZWQgY29uZGl0aW9ucy4NCg0KSW4gdGhpcyBoYWNrYXRob24gd2Ugd2lsbCBkbyBzb21l dGhpbmcgc2ltaWxhciBmb3IgUklGVCBuZXR3b3Jrcy4gV2Ugd2lsbCBidWlsZCBhIGxhcmdlIGZh dCB0cmVlIG5ldHdvcmsgb2YgUklGVCByb3V0ZXJzLiBUaGVuIHdlIHdpbGwgcmFuZG9tbHkgaW5z ZXJ0IGZhaWx1cmVzIGludG8gdGhlIG5ldHdvcmsgYW5kIG1ha2Ugc3VyZSB0aGF0IHRoZSBuZXR3 b3JrIGJlaGF2ZXMgY29ycmVjdGx5LiBXZSB3aWxsIG1ha2Ugc3VyZSB0aGUgUklGVCByb3V0ZXJz IGRvbid0IGNyYXNoIG9yIG90aGVyd2lzZSBiZWhhdmUgYmFkbHkuIEFuZCB3ZSB3aWxsIG1ha2Ug c3VyZSB0aGF0IHRoZSByb3V0ZXJzIGZvcndhcmRpbmcgdGFibGVzIGFuZCBsaW5rLXN0YXRlIGRh dGFiYXNlcyBjb252ZXJnZSBjb3JyZWN0bHkuDQoNCldlIHdpbGwgdXNlIChhbmQgcG9zc2libHkg ZW5oYW5jZSkgdGhlIGNoYW9zIHRlc3RpbmcgZnJhbWV3b3JrIGFzIHdlbGwgYXMgdGhlIHZpc3Vh bGl6YXRpb24gYW5kIHZlcmlmaWNhdGlvbiB0b29scyB0aGF0IGFyZSBhbHJlYWR5IHBhcnQgb2Yg dGhlIFJJRlQtUHl0aG9uIG9wZW4gc291cmNlIHByb2plY3QuDQoNCkV2ZW4gaWYgeW91IGFyZSBu b3QgbXVjaCBpbnRlcmVzdGVkIGluIHRoZSBSSUZUIHJvdXRpbmcgcHJvdG9jb2wsIGJ1dCB5b3Ug YXJlIGludGVyZXN0ZWQgaW4gdGVzdGluZyBsYXJnZSBuZXR3b3JrIHRvcG9sb2dpZXMgdXNpbmcg Y29udGFpbmVyLWxpa2UgdGVjaG5vbG9neSwgb3IgaW4gdmlzdWFsaXphdGlvbiB0b29scywgb3Ig aW4gY2hhb3MgdGVzdGluZywgdGhpcyBtaWdodCBiZSB0aGUgcmlnaHQgaGFja2F0aG9uIGZvciB5 b3UuDQoNCkEgZGV0YWlsZWQgZGVzY3JpcHRpb24gb2YgdGhlIHBsYW5uZWQgYWN0aXZpdGllcyBh dCB0aGUgaGFja2F0aG9uIGlzIGF2YWlsYWJsZSBhdDogaHR0cDovL2JpdC5seS9yaWZ0LWhhY2th dGhvbi1pZXRmLTEwNA0KDQpUaGUgcHJvamVjdCBpcyBsaXN0ZWQgb24gdGhlIElFVEYgMTA0IGhh Y2thdGhvbiB3aWtpIHBhZ2U6IGh0dHBzOi8vdHJhYy5pZXRmLm9yZy90cmFjL2lldGYvbWVldGlu Zy93aWtpLzEwNGhhY2thdGhvbiAoaW5mbyBjb3BpZWQgYmVsb3cpDQoNCkZlZWwgZnJlZSB0byBq b2luIHVzLg0KDQpCcnVubyBSaWpzbWFuDQoNCg0KUm91dGluZyBJbiBGYXQgVHJlZXMgKFJJRlQp IENoYW9zIE1vbmtleSBUZXN0aW5nDQoNCiogQ2hhbXBpb25zDQogICogVG9ueSBQcnp5Z2llbmRh IDxwcnogYXQganVuaXBlci5uZXQ8aHR0cDovL2p1bmlwZXIubmV0Pj4gKHdpbGwgam9pbiBpbiBw ZXJzb24pDQogICogQnJ1bm8gUmlqc21hbiA8YnJ1bm9yaWpzbWFuIGF0IGdtYWlsLmNvbTxodHRw Oi8vZ21haWwuY29tPj4gKHdpbGwgam9pbiByZW1vdGVseSkNCiogUHJvamVjdChzKQ0KICAqIOKA i1JJRlQgaXMgYSBTVEQgdHJhY2sgV0cgd29ya2luZyBvbiBhIG1vZGVybiBJUCBmYWJyaWMvREMg cm91dGluZyBwcm90b2NvbA0KICAqIOKAi0RldGFpbGVkIGRlc2NyaXB0aW9uIG9mIHRoZSBwbGFu bmVkIGFjdGl2aXRpZXMgYXQgdGhlIGhhY2thdGhvbiBhdA0KICAgIGh0dHA6Ly9iaXQubHkvcmlm dC1oYWNrYXRob24taWV0Zi0xMDQNCiAgKiBXZSBoYXZlIHR3byBpbXBsZW1lbnRhdGlvbnMgbm93 Og0KICAgICogUklGVC1QeXRob24gb3BlbiBzb3VyY2UNCiAgICAqIFZlbmRvciBpbXBsZW1lbnRh dGlvbg0KICAgICogVGhlIG9wZW4gc291cmNlIG9uZSBoYXMgYSBjaGFvcyBtb25rZXkgZnJhbWV3 b3JrIGluIHBsYWNlIHdlIGNhbiB1c2UNCiAgICAgIHRvIHN0cmVzcyBwcm90b2NvbCBpbXBsZW1l bnRhdGlvbnMgYW5kIGludGVyb3BlcmFiaWxpdHkgYmV0d2VlbiB0aGVtLg0KICAgICAgVW51c3Vh bCBoYWNrYXRob24gYnV0IHRoYXQgd2lsbCBiZSB2ZXJ5LCB2ZXJ5IHVzZWZ1bCBmb3IgZnVydGhl cg0KICAgICAgZGV2ZWxvcG1lbnQgYW5kIHF1YWxpdHkgb2YgaW1wbGVtZW50YXRpb25zIHdoaWxl IGJyZWFraW5nIGNvbXBsZXRlbHkNCiAgICAgIG5ldyBncm91bmRzIChjaGFvcyB0ZXN0aW5nIG9u IG1vZGVsIGJhc2VkIHByb3RvY29sIHNwZWNpZmljYXRpb25zKS4NCiogUHJlY29uZGl0aW9uczoN CiAgKiBQeXRob24ga25vd2xlZGdlDQogICogRmFtaWxpYXJpdHkgd2l0aCB0aGUgb3BlbiBzb3Vy Y2UgUklGVCBjb2RlIG9uIOKAi2h0dHBzOi8vZ2l0aHViLmNvbS9icnVub3JpanNtYW4vcmlmdC1w eXRob24NCiAgKiBSSUZUIFNwZWNpZmljYXRpb24gaW4gc29tZSBkZXRhaWwg4oCLUklGVCBkcmFm dA0KICAqIEZhbWlsaWFyaXR5IHdpdGggY3JlYXRpbmcgdmlydHVhbCBtYWNoaW5lcyBpbiBBV1MN Cg0K --_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJUaW1lcyBO ZXcgUm9tYW4gXChCb2R5IENTXCkiOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30N Ci8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYu TXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQt c2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KYTpsaW5r LCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1 ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBl cmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0K CXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29ub3JtYWwwLCBsaS5tc29ub3JtYWww LCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29ub3JtYWw7DQoJbXNvLW1hcmdp bi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltc28tbWFyZ2luLWJvdHRvbS1h bHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowaW47DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZh bWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLkVtYWlsU3R5bGUxOA0KCXttc28tc3R5 bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIixz ZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10 eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24x DQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9 DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+DQo8 L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+DQo8 ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1 b3Q7LHNlcmlmIj5IaSBCcnVubyw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtmb250LWZhbWlseTomcXVvdDtU aW1lcyBOZXcgUm9tYW4mcXVvdDssc2VyaWYiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2ZvbnQt ZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+VGhpcyBsb29rcyBsaWtl IGEgZ3JlYXQgcHJvamVjdC4gVGhhbmtzIGZvciBicmluZ2luZyBpdCB0byB0aGUgaGFja2F0aG9u LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTIuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90 OyxzZXJpZiI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMg TmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj5EbyB5b3UgaGF2ZSBhbnkgc3BlY2lhbCBuZXR3b3JrIHJl cXVpcmVtZW50cz8gUG93ZXIgYW5kIGFjY2VzcyB0byB0aGUgSUVURiBuZXR3b3JrIHZpYSBXaUZp IHdpbGwgYmUgYXZhaWxhYmxlIGF0IGFsbCB0YWJsZXMuIElmIHlvdSBuZWVkIHdpcmVkIGFjY2Vz cyBvciBhbnl0aGluZyBlbHNlLCBwbGVhc2UNCiBsZXQgbWUga25vdyBhcyBzb29uIGFzIHBvc3Np YmxlIGFuZCB3ZSB3aWxsIGRvIG91ciBiZXN0IHRvIGFjY29tbW9kYXRlLjxvOnA+PC9vOnA+PC9z cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIu MHB0O2ZvbnQtZmFtaWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyxzZXJpZiI+PG86cD4m bmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9 ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7 LHNlcmlmIj5DaGVlcnMsPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7VGltZXMg TmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj5DaGFybGVzPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Zm9udC1mYW1p bHk6JnF1b3Q7VGltZXMgTmV3IFJvbWFuJnF1b3Q7LHNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwv c3Bhbj48L3A+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNCNUM0 REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbiI+DQo8cCBjbGFzcz0iTXNvTm9ybWFs IiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4w cHQ7Y29sb3I6YmxhY2siPkZyb206DQo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSJmb250LXNpemU6 MTIuMHB0O2NvbG9yOmJsYWNrIj5oYWNrYXRob24gJmx0O2hhY2thdGhvbi1ib3VuY2VzQGlldGYu b3JnJmd0OyBvbiBiZWhhbGYgb2YgQnJ1bm8gUmlqc21hbiAmbHQ7YnJ1bm9yaWpzbWFuQGdtYWls LmNvbSZndDs8YnI+DQo8Yj5EYXRlOiA8L2I+TW9uZGF5LCBGZWJydWFyeSAyNSwgMjAxOSBhdCA1 OjE1IFBNPGJyPg0KPGI+VG86IDwvYj4mcXVvdDtoYWNrYXRob25AaWV0Zi5vcmcmcXVvdDsgJmx0 O2hhY2thdGhvbkBpZXRmLm9yZyZndDssICZxdW90O3JpZnRAaWV0Zi5vcmcmcXVvdDsgJmx0O3Jp ZnRAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDogPC9iPltoYWNrYXRob25dIFtSSUZUXSBS b3V0aW5nIGluIEZhdCBUcmVlcyAmcXVvdDtjaGFvcyB0ZXN0aW5nJnF1b3Q7IGhhY2thdGhvbiBh dCBJRVRGIDEwNCBpbiBQcmFndWU8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJz cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPkhpIGV2ZXJ5b25lLDxvOnA+PC9vOnA+PC9wPg0KPC9k aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4i PiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h bCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPkF0IHRoZSBSb3V0aW5nIEluIEZhdCBUcmVlcyAo UklGVCkgSUVURiAxMDQgaGFja2F0aG9uIGluIFByYWd1ZSB3ZSB3aWxsIGJlIHdvcmtpbmcgb24g JnF1b3Q7Y2hhb3MgbW9ua2V5JnF1b3Q7IHRlc3Rpbmcgb2YgdHdvIFJJRlQgaW1wbGVtZW50YXRp b25zOiB0aGUgUklGVC1QeXRob24gb3BlbiBzb3VyY2UgaW1wbGVtZW50YXRpb24gYW5kIGEgdmVu ZG9yIFJJRlQgaW1wbGVtZW50YXRpb24uPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8 L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFy Z2luLWxlZnQ6LjVpbiI+VGhpcyBoYWNrYXRob24gaXMgaW5zcGlyZWQgYnkgdGhlIGNvbmNlcHQg b2YgY2hhb3MgZW5naW5lZXJpbmcgYW5kIGluIHBhcnRpY3VsYXIgYnkgdGhlIGNoYW9zIG1vbmtl eSB0b29sLCB3aGljaCBpbnRlbnRpb25hbGx5IGFuZCByYW5kb21seSBzaHV0cyBkb3duIHNlcnZl cnMgaW4gYSBwcm9kdWN0aW9uIGVudmlyb25tZW50LiBUaGlzIGlzIGludGVuZGVkIHRvIGJ1aWxk DQogY29uZmlkZW5jZSBpbiB0aGUgc3lzdGVtJ3MgY2FwYWJpbGl0eSB0byB3aXRoc3RhbmQgdHVy YnVsZW50IGFuZCB1bmV4cGVjdGVkIGNvbmRpdGlvbnMuPG86cD48L286cD48L3A+DQo8L2Rpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86 cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz dHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+SW4gdGhpcyBoYWNrYXRob24gd2Ugd2lsbCBkbyBzb21l dGhpbmcgc2ltaWxhciBmb3IgUklGVCBuZXR3b3Jrcy4gV2Ugd2lsbCBidWlsZCBhIGxhcmdlIGZh dCB0cmVlIG5ldHdvcmsgb2YgUklGVCByb3V0ZXJzLiBUaGVuIHdlIHdpbGwgcmFuZG9tbHkgaW5z ZXJ0IGZhaWx1cmVzIGludG8gdGhlIG5ldHdvcmsgYW5kIG1ha2Ugc3VyZSB0aGF0IHRoZSBuZXR3 b3JrIGJlaGF2ZXMNCiBjb3JyZWN0bHkuIFdlIHdpbGwgbWFrZSBzdXJlIHRoZSBSSUZUIHJvdXRl cnMgZG9uJ3QgY3Jhc2ggb3Igb3RoZXJ3aXNlIGJlaGF2ZSBiYWRseS4gQW5kIHdlIHdpbGwgbWFr ZSBzdXJlIHRoYXQgdGhlIHJvdXRlcnMgZm9yd2FyZGluZyB0YWJsZXMgYW5kIGxpbmstc3RhdGUg ZGF0YWJhc2VzIGNvbnZlcmdlIGNvcnJlY3RseS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48bzpwPiZu YnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl PSJtYXJnaW4tbGVmdDouNWluIj5XZSB3aWxsIHVzZSAoYW5kIHBvc3NpYmx5IGVuaGFuY2UpIHRo ZSBjaGFvcyB0ZXN0aW5nIGZyYW1ld29yayBhcyB3ZWxsIGFzIHRoZSB2aXN1YWxpemF0aW9uIGFu ZCB2ZXJpZmljYXRpb24gdG9vbHMgdGhhdCBhcmUgYWxyZWFkeSBwYXJ0IG9mIHRoZSBSSUZULVB5 dGhvbiBvcGVuIHNvdXJjZSBwcm9qZWN0LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxvOnA+Jm5ic3A7 PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h cmdpbi1sZWZ0Oi41aW4iPkV2ZW4gaWYgeW91IGFyZSBub3QgbXVjaCBpbnRlcmVzdGVkIGluIHRo ZSBSSUZUIHJvdXRpbmcgcHJvdG9jb2wsIGJ1dCB5b3UgYXJlIGludGVyZXN0ZWQgaW4gdGVzdGlu ZyBsYXJnZSBuZXR3b3JrIHRvcG9sb2dpZXMgdXNpbmcgY29udGFpbmVyLWxpa2UgdGVjaG5vbG9n eSwgb3IgaW4gdmlzdWFsaXphdGlvbiB0b29scywgb3IgaW4gY2hhb3MgdGVzdGluZywgdGhpcw0K IG1pZ2h0IGJlIHRoZSByaWdodCBoYWNrYXRob24gZm9yIHlvdS48bzpwPjwvbzpwPjwvcD4NCjwv ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWlu Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48Yj5BIGRldGFpbGVkIGRlc2NyaXB0aW9uIG9m IHRoZSBwbGFubmVkIGFjdGl2aXRpZXMgYXQgdGhlIGhhY2thdGhvbiBpcyBhdmFpbGFibGUgYXQ6 Jm5ic3A7PGEgaHJlZj0iaHR0cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1pZXRmLTEwNCI+aHR0 cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1pZXRmLTEwNDwvYT48L2I+PG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6 LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+VGhlIHByb2plY3QgaXMgbGlzdGVkIG9u IHRoZSBJRVRGIDEwNCBoYWNrYXRob24gd2lraSBwYWdlOiZuYnNwOzxhIGhyZWY9Imh0dHBzOi8v dHJhYy5pZXRmLm9yZy90cmFjL2lldGYvbWVldGluZy93aWtpLzEwNGhhY2thdGhvbiI+aHR0cHM6 Ly90cmFjLmlldGYub3JnL3RyYWMvaWV0Zi9tZWV0aW5nL3dpa2kvMTA0aGFja2F0aG9uPC9hPiZu YnNwOyhpbmZvIGNvcGllZCBiZWxvdyk8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDs8bzpwPjwv bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn aW4tbGVmdDouNWluIj5GZWVsIGZyZWUgdG8gam9pbiB1cy48bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj48 bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi IHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj5CcnVubyBSaWpzbWFuPG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVp biI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+ Um91dGluZyBJbiBGYXQgVHJlZXMgKFJJRlQpIENoYW9zIE1vbmtleSBUZXN0aW5nPG86cD48L286 cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2lu LWxlZnQ6LjVpbiI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+KiBDaGFtcGlvbnM8bzpwPjwv bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn aW4tbGVmdDouNWluIj4mbmJzcDsgKiBUb255IFByenlnaWVuZGEgJmx0O3ByeiBhdCA8YSBocmVm PSJodHRwOi8vanVuaXBlci5uZXQiPg0KanVuaXBlci5uZXQ8L2E+Jmd0OyAod2lsbCBqb2luIGlu IHBlcnNvbik8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiIHN0eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDsgKiBCcnVubyBSaWpzbWFuICZsdDti cnVub3JpanNtYW4gYXQgPGEgaHJlZj0iaHR0cDovL2dtYWlsLmNvbSI+DQpnbWFpbC5jb208L2E+ Jmd0OyAod2lsbCBqb2luIHJlbW90ZWx5KTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiogUHJvamVjdChz KTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5 bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIOKAi1JJRlQgaXMgYSBTVEQgdHJhY2sgV0cg d29ya2luZyBvbiBhIG1vZGVybiBJUCBmYWJyaWMvREMgcm91dGluZyBwcm90b2NvbDxvOnA+PC9v OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdp bi1sZWZ0Oi41aW4iPiZuYnNwOyAqIOKAi0RldGFpbGVkIGRlc2NyaXB0aW9uIG9mIHRoZSBwbGFu bmVkIGFjdGl2aXRpZXMgYXQgdGhlIGhhY2thdGhvbiBhdCZuYnNwOzxvOnA+PC9vOnA+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41 aW4iPiZuYnNwOyAmbmJzcDsgPGEgaHJlZj0iaHR0cDovL2JpdC5seS9yaWZ0LWhhY2thdGhvbi1p ZXRmLTEwNCI+DQpodHRwOi8vYml0Lmx5L3JpZnQtaGFja2F0aG9uLWlldGYtMTA0PC9hPjxvOnA+ PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1h cmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIFdlIGhhdmUgdHdvIGltcGxlbWVudGF0aW9ucyBub3c6 PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls ZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICZuYnNwOyAqIFJJRlQtUHl0aG9uIG9wZW4gc291 cmNlPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz dHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICZuYnNwOyAqIFZlbmRvciBpbXBsZW1lbnRh dGlvbjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgKiBUaGUgb3BlbiBzb3VyY2Ug b25lIGhhcyBhIGNoYW9zIG1vbmtleSBmcmFtZXdvcmsgaW4gcGxhY2Ugd2UgY2FuIHVzZSZuYnNw OzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5 bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IHRvIHN0cmVzcyBwcm90 b2NvbCBpbXBsZW1lbnRhdGlvbnMgYW5kIGludGVyb3BlcmFiaWxpdHkgYmV0d2VlbiB0aGVtLiZu YnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IFVudXN1YWwgaGFj a2F0aG9uIGJ1dCB0aGF0IHdpbGwgYmUgdmVyeSwgdmVyeSB1c2VmdWwgZm9yIGZ1cnRoZXImbmJz cDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0 eWxlPSJtYXJnaW4tbGVmdDouNWluIj4mbmJzcDsgJm5ic3A7ICZuYnNwOyBkZXZlbG9wbWVudCBh bmQgcXVhbGl0eSBvZiBpbXBsZW1lbnRhdGlvbnMgd2hpbGUgYnJlYWtpbmcgY29tcGxldGVseSZu YnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg c3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAmbmJzcDsgJm5ic3A7IG5ldyBncm91bmRz IChjaGFvcyB0ZXN0aW5nIG9uIG1vZGVsIGJhc2VkIHByb3RvY29sIHNwZWNpZmljYXRpb25zKS48 bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl PSJtYXJnaW4tbGVmdDouNWluIj4qIFByZWNvbmRpdGlvbnM6PG86cD48L286cD48L3A+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWxlZnQ6LjVpbiI+ Jm5ic3A7ICogUHl0aG9uIGtub3dsZWRnZTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZuYnNwOyAqIEZh bWlsaWFyaXR5IHdpdGggdGhlIG9wZW4gc291cmNlIFJJRlQgY29kZSBvbiDigIs8YSBocmVmPSJo dHRwczovL2dpdGh1Yi5jb20vYnJ1bm9yaWpzbWFuL3JpZnQtcHl0aG9uIj5odHRwczovL2dpdGh1 Yi5jb20vYnJ1bm9yaWpzbWFuL3JpZnQtcHl0aG9uPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPiZu YnNwOyAqIFJJRlQgU3BlY2lmaWNhdGlvbiBpbiBzb21lIGRldGFpbCDigItSSUZUIGRyYWZ0PG86 cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i bWFyZ2luLWxlZnQ6LjVpbiI+Jm5ic3A7ICogRmFtaWxpYXJpdHkgd2l0aCBjcmVhdGluZyB2aXJ0 dWFsIG1hY2hpbmVzIGluIEFXUzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1hcmdpbi1sZWZ0Oi41aW4iPjxvOnA+Jm5ic3A7PC9vOnA+ PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_C08AF98816C9445BB005BD91F3146FA6ciscocom_-- From nobody Tue Feb 26 07:43:15 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121DB130E5D; Tue, 26 Feb 2019 07:43:06 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d31DdCoVXmF8; Tue, 26 Feb 2019 07:43:03 -0800 (PST) Received: from mail-qk1-x742.google.com (mail-qk1-x742.google.com [IPv6:2607:f8b0:4864:20::742]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08BFB130E84; Tue, 26 Feb 2019 07:43:03 -0800 (PST) Received: by mail-qk1-x742.google.com with SMTP id z13so7840817qki.2; Tue, 26 Feb 2019 07:43:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:date:subject:in-reply-to:to:references; bh=OuZmxSy1zxudTYP0+dEhc2bGnX1s5ZAUNNJi9yJORug=; b=Rg0Lda4T1MUieGFI85n37v0ivkD8nFIETjQ4rkfo464kXGOnZ4n2YNsshf7j8drIVw 0owe/IbFyhCS8NW7K7ZmSzMyOOFpB1ypCAPnBRtnnLDjUSHxohORwu4+K6wWzJIajtPW i7y70BIx5BqvqswOk2+evHv09xU4AxGaVPrO9yLb5Nl09bk3QcOZuy40RAr1N+B9oUKH 15ea4nA0xvVuXsspxsQyfbWDsMhthwSL2+HmJ8dzGd4Frn4/ALpjj7Xe73HCVgGHyXuD iR1XnS3YDg2E0vegwzaGTOr+dX5A1gPeAlDcwil6GJry/qEkfm3y8A86IkpZTZSFgjY5 VYMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:date:subject :in-reply-to:to:references; bh=OuZmxSy1zxudTYP0+dEhc2bGnX1s5ZAUNNJi9yJORug=; b=l32l0C0h/VGDubgANELNarrkrqOea8W2WjgB4VfW6ynDMP/f3PzVF7tgwFazg+C5WK b+CNzLSedh9mTItyn6wn2++4/bDuL12osuXYA2wOKx0H2Ob8adQCq3gEN0i0OLR9u6xO ZcUcMm76v32mYEeA+fVYxaY5CunNpBhY4ilEMldY/hgd8PIgBLEdaH6CeQ3gMW7Ohv7g KO4ZIp9LUwCr7pevZsV5DByBhLYV8gXgOPT74u7BTMeYkbP4DaJzEGNIj4riG5+3mPUX U7wIznccj8reY3cGYR6a56PUI9i4VubRB/jq/Y3JpPpozmQY204cXozW0R4mCctn+P+5 Nkkw== X-Gm-Message-State: AHQUAuZbQllTumMRE9HDvkrn7sj0Fon2EmyZ2jBPcy8UVVFD5LeH2CMe fy9K0CxjkiNx7OR+vHkYsIH/toBYPyA= X-Google-Smtp-Source: AHgI3IZ7omz2gfNku6S7iu1SqIcL/zvXg3rFIEz24eIOXkl2pa/oKSuF5Yd8tTL6F3Cra50f/pnW0A== X-Received: by 2002:a37:a704:: with SMTP id q4mr17919539qke.245.1551195780369; Tue, 26 Feb 2019 07:43:00 -0800 (PST) Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id z43sm8405237qtj.66.2019.02.26.07.42.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Feb 2019 07:42:59 -0800 (PST) From: Bruno Rijsman Message-Id: <57A11D39-A3DC-4482-AEBF-B72597CA1D61@gmail.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308" Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Date: Tue, 26 Feb 2019 12:42:53 -0300 In-Reply-To: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> To: hackathon@ietf.org, rift@ietf.org References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> X-Mailer: Apple Mail (2.3445.9.1) Archived-At: Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2019 15:43:06 -0000 --Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Quick follow-up: I also posted a youtube video of a hands-on walkthrough = of RIFT chaos testing: https://youtu.be/GqebgPmA4Xc = > On Feb 25, 2019, at 10:14 PM, Bruno Rijsman = wrote: >=20 > Hi everyone, > =20 > At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we = will be working on "chaos monkey" testing of two RIFT implementations: = the RIFT-Python open source implementation and a vendor RIFT = implementation. >=20 > This hackathon is inspired by the concept of chaos engineering and in = particular by the chaos monkey tool, which intentionally and randomly = shuts down servers in a production environment. This is intended to = build confidence in the system's capability to withstand turbulent and = unexpected conditions. >=20 > In this hackathon we will do something similar for RIFT networks. We = will build a large fat tree network of RIFT routers. Then we will = randomly insert failures into the network and make sure that the network = behaves correctly. We will make sure the RIFT routers don't crash or = otherwise behave badly. And we will make sure that the routers = forwarding tables and link-state databases converge correctly. >=20 > We will use (and possibly enhance) the chaos testing framework as well = as the visualization and verification tools that are already part of the = RIFT-Python open source project. >=20 > Even if you are not much interested in the RIFT routing protocol, but = you are interested in testing large network topologies using = container-like technology, or in visualization tools, or in chaos = testing, this might be the right hackathon for you. >=20 > A detailed description of the planned activities at the hackathon is = available at: http://bit.ly/rift-hackathon-ietf-104 = >=20 > The project is listed on the IETF 104 hackathon wiki page: = https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon = (info copied = below) > =20 > Feel free to join us. >=20 > Bruno Rijsman >=20 >=20 > Routing In Fat Trees (RIFT) Chaos Monkey Testing >=20 > * Champions > * Tony Przygienda > (will = join in person) > * Bruno Rijsman > = (will join remotely) > * Project(s) > * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC = routing protocol > * =E2=80=8BDetailed description of the planned activities at the = hackathon at=20 > http://bit.ly/rift-hackathon-ietf-104 = > * We have two implementations now: > * RIFT-Python open source > * Vendor implementation > * The open source one has a chaos monkey framework in place we can = use=20 > to stress protocol implementations and interoperability between = them.=20 > Unusual hackathon but that will be very, very useful for further=20= > development and quality of implementations while breaking = completely=20 > new grounds (chaos testing on model based protocol = specifications). > * Preconditions: > * Python knowledge > * Familiarity with the open source RIFT code on = =E2=80=8Bhttps://github.com/brunorijsman/rift-python = > * RIFT Specification in some detail =E2=80=8BRIFT draft > * Familiarity with creating virtual machines in AWS >=20 --Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Quick= follow-up: I also posted a youtube video of a hands-on walkthrough of = RIFT chaos testing: https://youtu.be/GqebgPmA4Xc

On Feb = 25, 2019, at 10:14 PM, Bruno Rijsman <brunorijsman@gmail.com> wrote:

Hi everyone,
 
At the Routing In Fat Trees (RIFT) IETF 104 hackathon in = Prague we will be working on "chaos monkey" testing of two RIFT = implementations: the RIFT-Python open source implementation and a vendor = RIFT implementation.

This hackathon is inspired by the concept of chaos = engineering and in particular by the chaos monkey tool, which = intentionally and randomly shuts down servers in a production = environment. This is intended to build confidence in the system's = capability to withstand turbulent and unexpected conditions.

In this hackathon we = will do something similar for RIFT networks. We will build a large fat = tree network of RIFT routers. Then we will randomly insert failures into = the network and make sure that the network behaves correctly. We will = make sure the RIFT routers don't crash or otherwise behave badly. And we = will make sure that the routers forwarding tables and link-state = databases converge correctly.

We will use (and possibly enhance) the = chaos testing framework as well as the visualization and verification = tools that are already part of the RIFT-Python open source = project.

Even = if you are not much interested in the RIFT routing protocol, but you are = interested in testing large network topologies using container-like = technology, or in visualization tools, or in chaos testing, this might = be the right hackathon for you.

A detailed description of = the planned activities at the hackathon is available at: http://bit.ly/rift-hackathon-ietf-104

The project is listed on = the IETF 104 hackathon wiki page: https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon&n= bsp;(info copied below)
 
Feel free to join us.

Bruno Rijsman


Routing In Fat Trees (RIFT) Chaos Monkey Testing

* Champions
  * Tony Przygienda <prz at juniper.net> (will join = in person)
  * Bruno Rijsman <brunorijsman = at gmail.com> (will join = remotely)
* Project(s)
  = * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC = routing protocol
  * =E2=80=8BDetailed = description of the planned activities at the hackathon = at 
  * We have two implementations now:
    * RIFT-Python open source
    * Vendor implementation
    * The open source one has a chaos monkey = framework in place we can use 
    =   to stress protocol implementations and interoperability between = them. 
      Unusual hackathon = but that will be very, very useful for further 
      development and quality of = implementations while breaking completely 
      new grounds (chaos testing on model = based protocol specifications).
* = Preconditions:
  * Python knowledge
  * Familiarity with the open source RIFT code on =E2=80=8B= https://github.com/brunorijsman/rift-python
  * RIFT Specification in some detail =E2=80=8BRIFT = draft
  * Familiarity with creating virtual = machines in AWS


= --Apple-Mail=_ACBC4B88-3D77-4228-A577-DC32428A1308-- From nobody Tue Feb 26 07:45:05 2019 Return-Path: X-Original-To: hackathon@ietfa.amsl.com Delivered-To: hackathon@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 779FF130E5D; Tue, 26 Feb 2019 07:44:56 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.112 X-Spam-Level: * X-Spam-Status: No, score=1.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URI_HEX=1.122] autolearn=no autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Joo0aY8RaIJo; Tue, 26 Feb 2019 07:44:54 -0800 (PST) Received: from mail-qk1-x72a.google.com (mail-qk1-x72a.google.com [IPv6:2607:f8b0:4864:20::72a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF27D130EC7; Tue, 26 Feb 2019 07:44:52 -0800 (PST) Received: by mail-qk1-x72a.google.com with SMTP id v139so7799113qkb.12; Tue, 26 Feb 2019 07:44:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=U7lxjBVAAAz0WfiW1OGg1xuIp+6/QR5WxcLoCXt+oxY=; b=OkSRUHSrt8lieKnjzq0qdmojXU5A/UytbMoRh1yhs4c/n8xidSodTjq5mJmMsP1xam QCABPg+NSFo9chS+WzMW4z1yRUhq2Q0Wty3vs9wi/Poh81e/GkD8uH8V3Whjtbq2uUxW ZNXHo3C8HEE/UYF/WjQtQm/IEx0zIrFMpF3z7ICYPCElwlODmT1V2IL5KIQjtcz5ggjB a9Kc6bfXAWJ8Im7TteAOa+ULAkFls4QCF+U7Knedme/0e9w6LnmN1j3+yisqSY9ansd4 SS+91RqWC5Layv7YVj/xn+7iHzQ7fSgqj+u0iMDcoAN45MnfOP/XfbZLgZawBxKroY4/ S6WA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=U7lxjBVAAAz0WfiW1OGg1xuIp+6/QR5WxcLoCXt+oxY=; b=c2axaa4BllGFxlyggJOK3jMgMs81daDNqEopF3Yz3c4L+ptc4b8cJEL32Xr+vwPZM7 i18N5JpkeTGOwkiyWvvHSVfNqhAkQLfrxkJf/jv/v1kOEMT04hBoHkNCVU77A9nKvjwB N5jMRI/QRR1Hr8OMD6Z41lS+LDj2PaYojG1CzSramuCoC3IHLcvr+eoGVT5tRKZs7rQ3 r72zujP93q+cxJV6T7u2aMR4munu8Axm+zF8/cs7IzXwwOnH7yOKtFiChWSEGmG20hkh HfjdnyxEbx22wW7WPO7y4s53DxmQieUwPXXJ+ldYDCnIgwcYEAUm82nh85UHK/bGwg4n 4UYQ== X-Gm-Message-State: AHQUAuZtaFFLXdeAagSGIZZFRShjf8Zuf3tTeOPv2sPUw8oQ7RRsLFJm R2McSzRr2a/xsHUjuk/usgo= X-Google-Smtp-Source: AHgI3Ib+ZDrvQ2pLcYFswMqFQQnWrReBU3BN8K8/+E8ReL5XsavB5Y7BSSlwPY8Q6vTfmtUPsjawEw== X-Received: by 2002:ae9:ea0f:: with SMTP id f15mr17670403qkg.113.1551195891593; Tue, 26 Feb 2019 07:44:51 -0800 (PST) Received: from [192.168.8.108] (ip-53-226-107-190.nextelmovil.cl. [190.107.226.53]) by smtp.gmail.com with ESMTPSA id u18sm3578791qka.25.2019.02.26.07.44.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Feb 2019 07:44:50 -0800 (PST) From: Bruno Rijsman Message-Id: <379F1E9E-7EAA-4B06-946A-6A1FDDC0BF57@gmail.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974" Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) Date: Tue, 26 Feb 2019 12:44:46 -0300 In-Reply-To: Cc: "hackathon@ietf.org" , "rift@ietf.org" To: "Charles Eckel (eckelcu)" References: <0A0D8BBD-E6F3-4272-BD12-EB093AE7E8D4@gmail.com> X-Mailer: Apple Mail (2.3445.9.1) Archived-At: Subject: Re: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague X-BeenThere: hackathon@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion regarding past, present, and future IETF hackathons." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2019 15:44:57 -0000 --Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi Charles,=20 No, no special requirements. Just good Internet access, since all of = the heavy lifting will happen in the AWS cloud. =E2=80=94 Bruno > On Feb 26, 2019, at 12:36 PM, Charles Eckel (eckelcu) = wrote: >=20 > Hi Bruno, > =20 > This looks like a great project. Thanks for bringing it to the = hackathon. > =20 > Do you have any special network requirements? Power and access to the = IETF network via WiFi will be available at all tables. If you need wired = access or anything else, please let me know as soon as possible and we = will do our best to accommodate. > =20 > Cheers, > Charles > =20 > From: hackathon on behalf of Bruno = Rijsman > Date: Monday, February 25, 2019 at 5:15 PM > To: "hackathon@ietf.org" , "rift@ietf.org" = > Subject: [hackathon] [RIFT] Routing in Fat Trees "chaos testing" = hackathon at IETF 104 in Prague > =20 > Hi everyone, > =20 > At the Routing In Fat Trees (RIFT) IETF 104 hackathon in Prague we = will be working on "chaos monkey" testing of two RIFT implementations: = the RIFT-Python open source implementation and a vendor RIFT = implementation. > =20 > This hackathon is inspired by the concept of chaos engineering and in = particular by the chaos monkey tool, which intentionally and randomly = shuts down servers in a production environment. This is intended to = build confidence in the system's capability to withstand turbulent and = unexpected conditions. > =20 > In this hackathon we will do something similar for RIFT networks. We = will build a large fat tree network of RIFT routers. Then we will = randomly insert failures into the network and make sure that the network = behaves correctly. We will make sure the RIFT routers don't crash or = otherwise behave badly. And we will make sure that the routers = forwarding tables and link-state databases converge correctly. > =20 > We will use (and possibly enhance) the chaos testing framework as well = as the visualization and verification tools that are already part of the = RIFT-Python open source project. > =20 > Even if you are not much interested in the RIFT routing protocol, but = you are interested in testing large network topologies using = container-like technology, or in visualization tools, or in chaos = testing, this might be the right hackathon for you. > =20 > A detailed description of the planned activities at the hackathon is = available at: http://bit.ly/rift-hackathon-ietf-104 = > =20 > The project is listed on the IETF 104 hackathon wiki page: = https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon = (info copied below) > =20 > Feel free to join us. > =20 > Bruno Rijsman > =20 > =20 > Routing In Fat Trees (RIFT) Chaos Monkey Testing > =20 > * Champions > * Tony Przygienda > (will join in person) > * Bruno Rijsman > (will join remotely) > * Project(s) > * =E2=80=8BRIFT is a STD track WG working on a modern IP fabric/DC = routing protocol > * =E2=80=8BDetailed description of the planned activities at the = hackathon at=20 > http://bit.ly/rift-hackathon-ietf-104 = > * We have two implementations now: > * RIFT-Python open source > * Vendor implementation > * The open source one has a chaos monkey framework in place we can = use=20 > to stress protocol implementations and interoperability between = them.=20 > Unusual hackathon but that will be very, very useful for further=20= > development and quality of implementations while breaking = completely=20 > new grounds (chaos testing on model based protocol = specifications). > * Preconditions: > * Python knowledge > * Familiarity with the open source RIFT code on = =E2=80=8Bhttps://github.com/brunorijsman/rift-python = > * RIFT Specification in some detail =E2=80=8BRIFT draft > * Familiarity with creating virtual machines in AWS > =20 > _______________________________________________ > hackathon mailing list > hackathon@ietf.org > = https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ie= tf.org%2Fmailman%2Flistinfo%2Fhackathon&data=3D02%7C01%7C%7C8041ec8127= 374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636867= 922294939371&sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRTl7pqYcLtBSMhGMzWY%3= D&reserved=3D0 = --Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Hi = Charles, 

No, = no special requirements.  Just good Internet access, since all of = the heavy lifting will happen in the AWS cloud.

=E2=80=94 Bruno

On Feb = 26, 2019, at 12:36 PM, Charles Eckel (eckelcu) <eckelcu@cisco.com> = wrote:

Hi Bruno,
 
This looks like a great project. Thanks = for bringing it to the hackathon.
 
Do you have any special network = requirements? Power and access to the IETF network via WiFi will be = available at all tables. If you need wired access or anything else, = please let me know as soon as possible and we will do our best to = accommodate.
 
Cheers,
Charles
 
From: hackathon <hackathon-bounces@ietf.org> on behalf of Bruno Rijsman = <brunorijsman@gmail.com>
Date: Monday, February 25, = 2019 at 5:15 PM
To: "hackathon@ietf.org" = <hackathon@ietf.org>, "rift@ietf.org" <rift@ietf.org>
Subject: 
[hackathon] [RIFT] = Routing in Fat Trees "chaos testing" hackathon at IETF 104 in Prague
 
Hi = everyone,
 
At the Routing In Fat Trees (RIFT) IETF 104 hackathon in = Prague we will be working on "chaos monkey" testing of two RIFT = implementations: the RIFT-Python open source implementation and a vendor = RIFT implementation.
 
This hackathon is inspired by the concept of = chaos engineering and in particular by the chaos monkey tool, which = intentionally and randomly shuts down servers in a production = environment. This is intended to build confidence in the system's = capability to withstand turbulent and unexpected conditions.
 
In this hackathon we will do something = similar for RIFT networks. We will build a large fat tree network of = RIFT routers. Then we will randomly insert failures into the network and = make sure that the network behaves correctly. We will make sure the RIFT = routers don't crash or otherwise behave badly. And we will make sure = that the routers forwarding tables and link-state databases converge = correctly.
 
We will use (and possibly enhance) the chaos = testing framework as well as the visualization and verification tools = that are already part of the RIFT-Python open source project.
 
Even if you are not much interested in = the RIFT routing protocol, but you are interested in testing large = network topologies using container-like technology, or in visualization = tools, or in chaos testing, this might be the right hackathon for = you.
 
A detailed description of the = planned activities at the hackathon is available at: http://bit.ly/rift-hackathon-ietf-104
 
The project is listed on the IETF 104 = hackathon wiki page: https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon&n= bsp;(info copied below)
 
Feel free to join us.
 
Bruno Rijsman
 
 
Routing In Fat Trees (RIFT) Chaos Monkey = Testing
 
* Champions
  * Tony = Przygienda <prz at juniper.net> (will join = in person)
  * Bruno Rijsman <brunorijsman = at gmail.com> (will join = remotely)
* Project(s)
  * =E2=80=8BRIFT is a STD track WG working on a modern = IP fabric/DC routing protocol
  * =E2=80=8BDeta= iled description of the planned activities at the hackathon at 
  * We have two implementations now:
    * RIFT-Python open source
    * Vendor implementation
    * The open source one has a chaos monkey = framework in place we can use 
      = to stress protocol implementations and interoperability between = them. 
      Unusual hackathon = but that will be very, very useful for further 
      development and quality of = implementations while breaking completely 
      new grounds (chaos testing on model = based protocol specifications).
* Preconditions:
  * Python knowledge
  * Familiarity = with the open source RIFT code on =E2=80=8Bhttps://github.com/brunorijsman/rift-python
  * RIFT Specification in some detail =E2=80=8BRIFT = draft
  * Familiarity with creating = virtual machines in AWS
 
_______________________________________________
hackathon mailing list
hackathon@ietf.org
https://nam05.safelinks.protection.outlook.com/?url=3Dhttps%3A%= 2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fhackathon&amp;data=3D02%7C01%= 7C%7C8041ec8127374fcea70c08d69c004347%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7= C1%7C0%7C636867922294939371&amp;sdata=3D1bGO7%2FcCFOJp%2F4s3AbEpMtjoRT= l7pqYcLtBSMhGMzWY%3D&amp;reserved=3D0

= --Apple-Mail=_A7182C1C-FED9-488C-9714-93E23F6B0974--