From nobody Tue Nov 1 13:28:36 2016 Return-Path: X-Original-To: sipbrandy@ietfa.amsl.com Delivered-To: sipbrandy@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D4351299B2; Tue, 1 Nov 2016 13:28:34 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -16.017 X-Spam-Level: X-Spam-Status: No, score=-16.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XW2-ONEy7Z4i; Tue, 1 Nov 2016 13:28:33 -0700 (PDT) Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F90B1294B8; Tue, 1 Nov 2016 13:28:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1541; q=dns/txt; s=iport; t=1478032113; x=1479241713; h=from:to:cc:subject:date:message-id:mime-version; bh=Oc51KceGZYJuJi0XuWDmLBx6b+XB2N3l5Keowx7Fixw=; b=IDv2g6dXsHwgnC/i8vO8l2lTxPI0iIL/B52FAUNaHEfsWIeMqN7wghnI +Kah4PPmg0REdGOYkzfBSqHqQjYfAD+fQxYS80a8X3i27NCmr9w3v7izX EVKjQ91RKI3nLvStKaGe3426C+xHsbaZcCVauOhjz7wY1ruBnEC+Ne5nE w=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CyBAC4+hhY/4sNJK1dGwEBAQMBAQEJA?= =?us-ascii?q?QEBgyoBAQEBAR9YgQOzXYMIgg+CByiFeoIYQBMBAgEBAQEBAQFiHQuEWBB5EgE?= =?us-ascii?q?LAXQnBA6IWQ64VwEBAQEBAQEBAQEBAQEBAQEBAQEBARcFhj2BfQiGaREBg02CL?= =?us-ascii?q?wWaGgGGMIoEkAaRFgEgAjIiPoUThiKBIIEMAQEB?= X-IronPort-AV: E=Sophos;i="5.31,433,1473120000"; d="scan'208,217";a="341481415" Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 01 Nov 2016 20:28:32 +0000 Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id uA1KSWST013363 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 1 Nov 2016 20:28:32 GMT Received: from xch-aln-009.cisco.com (173.36.7.19) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 1 Nov 2016 15:28:31 -0500 Received: from xch-aln-009.cisco.com ([173.36.7.19]) by XCH-ALN-009.cisco.com ([173.36.7.19]) with mapi id 15.00.1210.000; Tue, 1 Nov 2016 15:28:31 -0500 From: "Gonzalo Salgueiro (gsalguei)" To: "sipbrandy@ietf.org" Thread-Topic: SIPBRANDY Agenda for IETF 97 Thread-Index: AQHSNH6DVo8xAgRcxEu00gw+4TrRcg== Date: Tue, 1 Nov 2016 20:28:31 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.150.179.3] Content-Type: multipart/alternative; boundary="_000_CF28E80154734DF8A50A7D2BB519DA43ciscocom_" MIME-Version: 1.0 Archived-At: Cc: "sipbrandy-chairs@ietf.org" , Jon Peterson Subject: [Sipbrandy] SIPBRANDY Agenda for IETF 97 X-BeenThere: sipbrandy@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SIPBRANDY working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Nov 2016 20:28:34 -0000 --_000_CF28E80154734DF8A50A7D2BB519DA43ciscocom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi, Jon has updated the BCP draft and would like to discuss it in Seoul. The a= genda has been posted: https://datatracker.ietf.org/meeting/97/agenda/sipbrandy/ [[NOTE: OSRTP draft will not be discussed in Seoul but we do hope to make p= rogress on it over email.]] Cheers, Gonzalo --_000_CF28E80154734DF8A50A7D2BB519DA43ciscocom_ Content-Type: text/html; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable Hi,

Jon has updated the BCP draft and would like to discuss it in Seoul.  = The agenda has been posted:

https://datatracker.ietf.org/meeting/97/agenda/sipbrandy/

[[NOTE: OSRTP draft will not be discussed in Seoul but we d= o hope to make progress on it over email.]]

Cheers,

Gonzalo
--_000_CF28E80154734DF8A50A7D2BB519DA43ciscocom_-- From nobody Tue Nov 15 00:16:29 2016 Return-Path: X-Original-To: sipbrandy@ietfa.amsl.com Delivered-To: sipbrandy@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61E52129A42 for ; Tue, 15 Nov 2016 00:16:28 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.397 X-Spam-Level: X-Spam-Status: No, score=-3.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.497] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0p56eBG3vK5Z for ; Tue, 15 Nov 2016 00:16:26 -0800 (PST) Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA4F7129A45 for ; Tue, 15 Nov 2016 00:16:26 -0800 (PST) Received: from dhcp-8915.meeting.ietf.org (t2001067c03700128fdd5b8a857fbe985.v6.meeting.ietf.org [IPv6:2001:67c:370:128:fdd5:b8a8:57fb:e985]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id uAF8GOfe084179 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Tue, 15 Nov 2016 02:16:25 -0600 (CST) (envelope-from mahoney@nostrum.com) X-Authentication-Warning: raven.nostrum.com: Host t2001067c03700128fdd5b8a857fbe985.v6.meeting.ietf.org [IPv6:2001:67c:370:128:fdd5:b8a8:57fb:e985] claimed to be dhcp-8915.meeting.ietf.org To: sipbrandy@ietf.org From: "A. Jean Mahoney" Message-ID: Date: Tue, 15 Nov 2016 17:16:21 +0900 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Subject: [Sipbrandy] Notes from SIPBRANDY 97 session X-BeenThere: sipbrandy@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SIPBRANDY working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Nov 2016 08:16:28 -0000 Hi all, Here are my notes from the session this morning. Let me know if I missed anything. Thanks! Jean SIPBRANDY (SIP Best-practice Recommendations Against Network Dangers to privacY) - IETF 97 Monday November 14, 2016, 11:00-12:00 Grand Ballroom 2 WG chairs: Gonzalo Camarillo and Gonzalo Salgueiro Responsible AD: Ben Campbell Jabber scribe: Jonathan Lennox Minute taker: Jean Mahoney ----------------------------------------------------------------- 11:00 - 11:05 Introduction Presenters: Gonzalo Camarillo and Gonzalo Salgueiro Presentation: https://www.ietf.org/proceedings/97/slides/slides-97-sipbrandy-chair-slides-00.pptx slide 1: Title slide 2: Note well slide 3: Agenda Gonzalo Camarillo - Nothing new to present on OSRTP and Alan is not here. Ben, anything on PS versus Informational on the OSRTP draft? did the WG give you the input you needed? Ben Campbell - I think I got input - we are updating a current PS that piece needs to be PS. I need to talk to other ADs about whether the organization is ok. Gonzalo Camarillo - we're concerned about the energy within the working group. But with the lull in STIR, we should see more energy. Jon Peterson - We don't need a whole lot of energy. There's a limited amount of work left to do here, and we'll be able to do it. ----------------------------------------------------------------- 11:05 - 12:00 BCP for Securing RTP Media Signaled with SIP Presenter: Jon Peterson Presentation: https://www.ietf.org/proceedings/97/slides/slides-97-sipbrandy-best-practices-for-securing-rtp-media-signaled-with-sip-00.pptx Draft: https://datatracker.ietf.org/doc/draft-ietf-sipbrandy-rtpsec/ slide 1: Title slide 2: Media Confidentiality with SIP slide 3: Two pronged strategy slide 4: The WG -01 STIR has been rapidly changing over the last 4 months. We can now apply those changes to SIPBRANDY work. And there won't be a lot to do after this. As we discussed in Berlin, we removed the pointer to PERC since it was not mature enough. We removed a lot of OSRTP, you can read Alan's draft about that. slide 5: A STIR profile slide 6: Media Security Using DTLS-SRTP was somewhat contentious in Berlin. MUST for DTLS-SRTP. Is this still how we want to do it? [no objections from the room] slide 7: Credential Management Needs some work. The guidance is inspirational rather than specific. Credential acquisition is the only thing that show that the passport was signed by an end-user device. Russ Housley - who are we going to mandate to have the cert, then we can talk about how they can get it. STIR accommodates signatures at different points of the call path. Will this say which place MUST support? Can't answer the question until you know who the assigner is. Jon - This is for e2e security. The credentials required to sign this must reside on the end point. SIP makes this problematic - endpoints are an abstraction, there are end user gateways for black phones. I'm trying to determine the best assurance, multifactor auth to couple this to the device. Eric Rescorla - about SP certs, transparency mechanisms like ct can alleviate these concerns. Cullen Jennings - at a meta level - we don't have to prescribe other ways but we need some way. We need someway, a solution to this. This is the hard part of it. Should be in our scope. Jon - TLS doesn't solve this problem, how to get the certs. I know we want to give guidance. Is there better guidance? Chris Wendt - It's not mentioned explicitly, but service providers have to do MITM. We have to be able to do some legal things. Jon - There's some wording on siprec, a mechanism that supports that. This mechanism is for enabling E2E security. Chris - I want e2e media security. It would be beneficial if it could happen, but we have MITM requirements. Jon - I understand that. PERPASS model understands that and we are coding to that. slide 8: Connected Identity STIR only works on requests not responses. End points need connected identity. Need to sign for that identity. Does RFC4916 need an update? I'm not sure it does. If some else could read it and give an assessment. Jonathan Lennox - could examples go in one of the other drafts? Jon - could do that. Gonzo - could we have a volunteer to look at this? Jon - Given the deltas between 4474bis and 4474, do we need to update 4916? Adam Roach - Last time I volunteered, it took me a whole IETF cycle to get to it, but put my name down and then bother the crap out of me. ACTION: Bother the crap out of Adam to review RFC 4916 to see if it needs updating. slide 9: Opportunistic Use Do people want Opportunistic use? I could document it. Or do we want to take a strong stand against it. Gonzalo Salgueiro, from the floor - Document it in this draft? Jon - yes Cullen - We should describe this for practical deployments. And then decide to say, We hate this, but we know you'll do it anyway, all in caps. Christer - Isn't this more generic and need to be documented in a STIR document? Jon - this is how it works in STIR now. This is a profile of STIR, we could fail it. We could allow it explicitly - explain how to do it. Right now, we don't say either way. If we say nothing, we allow it. Christer - assume that I'm the verifier and I only support STIR. I get an INVITE with msec, and I don't know msec. Is it still ok to indicate that call is verified? I don't want to reject it. Jon - we're not changing that behavior. The change here is on the authentication service side, that when the verifier sends back the response - if it doesn't have msec, you HAVE to fail out. Lennox - What about warnings like, this guy did msec yesterday, but not today. Jon - more complex policy and analytics is not in immediate scope. The tofu stuff should have guidance like that. Lennox - it's like inverse tofu. Related thing - do want anything in baseline stir - basic comprehension mandatory. If you don't understand this field, ignore identity or fail the call? Jon - This is documented already. We don't prescribe in STIR, local policy up to you. We doing something different here and can make it stricter if we want. Eric Rescorla - You offer 3 options: pass on silently, document, forbid. I think documenting would be useful. Jon - The sense I get is that people are cool with documenting. ekr - tofu hasn't worked out well. People are reluctant to decide on keying material. Losing their key and the consequence is that no one can call them again - not a good outcome. Jon - I think we'll go with explicitly documenting that this loophole exists and what it would look like to do this opportunistically. slide 10: Path Forward Jon - can tighten msec text. We can start adding concrete examples. Need to work on rtcweb alignment. Possible to have e2e security with a sip endpoint using STIR and a rtcweb endpoint. That was a stretch goal. Just make sure we don't close doors. Cullen's draft is appreciated, and gives context around those doors. Cullen - status on this - we may hit the stretch goal. I think it will work with what we have now. Martin Thomson - I'm cautious until I've implemented. Haven't done it yet. Relatively trivial, though. Jon - Provided that STIR doesn't change 15 more times, we should be in good shape by March. Gonzalo - When Jon revises the draft, please review and send comments. AOB? (none) 12:00 Meeting ends From nobody Mon Nov 21 00:12:59 2016 Return-Path: X-Original-To: sipbrandy@ietfa.amsl.com Delivered-To: sipbrandy@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D15941297CC; Mon, 21 Nov 2016 00:12:57 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -16.017 X-Spam-Level: X-Spam-Status: No, score=-16.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Sm8KphU2vvE; Mon, 21 Nov 2016 00:12:56 -0800 (PST) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 818CB1297CB; Mon, 21 Nov 2016 00:12:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1508; q=dns/txt; s=iport; t=1479715976; x=1480925576; h=from:to:cc:subject:date:message-id:mime-version; bh=hyDNJpVZth6f5FzFeb367oyCnTdJuh0t0rVFHCoQS+o=; b=b1mZ1piVpnJq/zy2T7OBE7iVITEidE6VXp6zS+T0pK21anjXhXeRlzyZ fxKOIS/jR0E2/l19JD+HvIRdjG+JsRyTnUlseIFSAqKv/WwDrmMpcPYQ6 gmszDnIXAyYoWpuGnh8cP64VUfKTt7xrOUH0zW8mbfsMBw95IjH7P/uFE 0=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CfAgAIqzJY/4wNJK1dHAEBBAEBCgEBg?= =?us-ascii?q?zgBAQEBAR9YgQAHjTimYIMRgg6CBSiFeYIIPxQBAgEBAQEBAQFiHQuEXxB5EgE?= =?us-ascii?q?LAXQnBA6Icg6rF4tMAQEBAQEBAQEBAQEBAQEBAQEBAQEBFwWGPIF9CIpPgjAFm?= =?us-ascii?q?k0BgUWPMYFwhHeJQJFpAR43LmSFQXIBhy+BDAEBAQ?= X-IronPort-AV: E=Sophos;i="5.31,674,1473120000"; d="scan'208,217";a="171874565" Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Nov 2016 08:12:55 +0000 Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id uAL8CtiQ024746 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 21 Nov 2016 08:12:55 GMT Received: from xch-aln-009.cisco.com (173.36.7.19) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Mon, 21 Nov 2016 02:12:54 -0600 Received: from xch-aln-009.cisco.com ([173.36.7.19]) by XCH-ALN-009.cisco.com ([173.36.7.19]) with mapi id 15.00.1210.000; Mon, 21 Nov 2016 02:12:54 -0600 From: "Gonzalo Salgueiro (gsalguei)" To: "sipbrandy@ietf.org" Thread-Topic: Draft minutes of SIPBRANDY@IETF97 available Thread-Index: AQHSQ88PZdo2sivTA0mTru7jPjmQlw== Date: Mon, 21 Nov 2016 08:12:54 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.82.183.3] Content-Type: multipart/alternative; boundary="_000_D773F04218754A5C9C16CFB86F493795ciscocom_" MIME-Version: 1.0 Archived-At: Cc: "sipbrandy-chairs@ietf.org" Subject: [Sipbrandy] Draft minutes of SIPBRANDY@IETF97 available X-BeenThere: sipbrandy@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SIPBRANDY working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Nov 2016 08:12:58 -0000 --_000_D773F04218754A5C9C16CFB86F493795ciscocom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi, We've just posted the minutes: https://www.ietf.org/proceedings/97/minutes/minutes-97-sipbrandy-00.txt Please send corrections/comments by Friday, Nov. 25th. Huge shout out of thanks to Jean Mahoney for taking excellent minutes! Cheers, Gonzalo C. & Gonzalo S. --_000_D773F04218754A5C9C16CFB86F493795ciscocom_ Content-Type: text/html; charset="us-ascii" Content-ID: <219C66E6A24B1D42BB6E4F4157A2E3B2@emea.cisco.com> Content-Transfer-Encoding: quoted-printable Hi,

We've just posted the minutes:

https://www.ietf.org/proceedings/97/minutes/minutes-97-= sipbrandy-00.txt

Please send corrections/comments by Friday, Nov. 25th.

Huge shout out of thanks to Jean Mahoney for taking excellent minutes!

Cheers,

Gonzalo C. & Gonzalo S. --_000_D773F04218754A5C9C16CFB86F493795ciscocom_-- From nobody Mon Nov 21 00:42:47 2016 Return-Path: X-Original-To: sipbrandy@ietfa.amsl.com Delivered-To: sipbrandy@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F92E12983F; Mon, 21 Nov 2016 00:42:46 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.221 X-Spam-Level: X-Spam-Status: No, score=-104.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7vbacSGrrZhw; Mon, 21 Nov 2016 00:42:44 -0800 (PST) Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24F8312984F; Mon, 21 Nov 2016 00:42:43 -0800 (PST) X-AuditID: c1b4fb30-593ff70000001942-a0-5832b380a156 Received: from ESESSHC004.ericsson.se (Unknown_Domain [153.88.183.30]) by (Symantec Mail Security) with SMTP id 58.D3.06466.083B2385; Mon, 21 Nov 2016 09:42:42 +0100 (CET) Received: from [131.160.50.75] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.32) with Microsoft SMTP Server id 14.3.319.2; Mon, 21 Nov 2016 09:42:40 +0100 To: "Gonzalo Salgueiro (gsalguei)" , "sipbrandy@ietf.org" References: From: Gonzalo Camarillo Message-ID: Date: Mon, 21 Nov 2016 10:42:39 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsUyM2K7nG7TZqMIgxkfOS3mTvGzuNazkd1i xbpTTA7MHlN+b2T1WLLkJ1MAUxSXTUpqTmZZapG+XQJXxprnNxkLpjNX9Ex8zNbAeJipi5GT Q0LAROLLouMsXYxcHEIC6xglvr1sYoVwVjNK3Pu5FKiKg0NYwEKiqzEDpEFEIEViV8cpsLCQ gI3EqwYrkDCzgLXErLUT2EFsNqDqLbfus4DYvAL2EodaT4DFWQRUJa6+ewlmiwrESFx/9ogN okZQ4uTMJ2D1nAK2Eqv2PmODmGkgcWTRHFYIW15i+9s5zCC2kIC2xPJnLSwTGAVmIWmfhaRl FpKWBYzMqxhFi1OLk3LTjYz0Uosyk4uL8/P08lJLNjECg/Pglt8GOxhfPnc8xCjAwajEw1tw 0yBCiDWxrLgy9xCjBAezkgjvmk1GEUK8KYmVValF+fFFpTmpxYcYpTlYlMR5zVbeDxcSSE8s Sc1OTS1ILYLJMnFwSjUwylx+HNfcyfpb/+vhRqm8zwZVYTduJrGobftt67DcQtP34w5+iyd3 3x5g1ohS74go5PggsGa20FNpxoDzNv9OyIYsXiqhFbB2qZeVbHf1zxQBwScHRNmFLz05NMHg btJNjSfputZCT4+Lfl561Dy/LTi3+GTjoSCHgyX/KqZxbmi72vG13ydAiaU4I9FQi7moOBEA l0LbIUoCAAA= Archived-At: Cc: "sipbrandy-chairs@ietf.org" Subject: Re: [Sipbrandy] Draft minutes of SIPBRANDY@IETF97 available X-BeenThere: sipbrandy@ietf.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SIPBRANDY working group discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Nov 2016 08:42:46 -0000 Yes, thank you, Jean! Gonzalo On 21/11/2016 10:12 AM, Gonzalo Salgueiro (gsalguei) wrote: > Hi, > > We've just posted the minutes: > > https://www.ietf.org/proceedings/97/minutes/minutes-97-sipbrandy-00.txt > > Please send corrections/comments by Friday, Nov. 25th. > > Huge shout out of thanks to Jean Mahoney for taking excellent minutes! > > Cheers, > > Gonzalo C. & Gonzalo S.