►
From YouTube: IETF109-EMU-20201120-0500
Description
EMU meeting session at IETF109
2020/11/20 0500
https://datatracker.ietf.org/meeting/109/proceedings/
A
I'll
take
I'll
take
notes
and
I'm
sure
someone
will
kind
of
step
up
with
me
to
work
in
cody
md
as
well.
No
worries.
A
B
Yeah,
let's
get
started
joe
salloway
one
of
the
chairs
and
my
co-chair
mohit
is
also
on,
and
this
is
the
emu
meeting
for
the
virtual
ietf109.
B
So
there's
a
couple
links
here,
I
think,
probably
by
this
time
in
the
week
you're
pretty
experienced
with
dealing
with
the
virtual
meeting
tools,
but
here's
some
info,
but
what
you're
probably
really
all
waiting
for
is
the
favorite
notewell
again
you're-
probably
all
familiar
with
this.
But
if
you're
not
please
familiar
yourself
familiarize
yourself
with
the
ietf's
ipr
policies.
B
All
right,
so
we
have
a
pretty
full
agenda.
I
think
we'll
have
enough
time
for
it
this
time,
but
because
we
ran
out
of
time
last
time
we
did
give
a
priority
to
some
of
the
presentations
that
we
were
unable
to
get
to
in.
At
the
last
virtual
meeting
we
have
note
takers,
the
blue
sheets
are
taken
automatically.
We
have
people
monitoring
jabber,
so
is
there
any
bashing
of
the
agenda
that
we'd
like
to?
B
Do
I
mean
we
have
tls
proof
of
knowledge
from
either
owen
or
dan
will
present,
I'm
not
sure
which-
and
we
have
tls
ibs,
we'll
go
through
some
of
the
type
of
rada.
Hopefully,
that
will
not
take
the
whole
time,
but
hopefully
we
can
have
some
good
discussion
on
that,
an
update
for
eep
noob
and
then
a
new
presentation
on
eve
ad
hoc,
any
other
topics.
People
want
to
go
through.
B
So
I
don't
know
mohit
did
you
want
to
talk
through
some
of
the
draft
status
or.
C
Yeah,
so
I
will
be
presenting
a
short
update
on
eve
noob,
so
we'll
deal
with
that
during
the
agenda
today
I
think
yari
submitted
an
update
of
epk
pfs.
I
don't
know
if
yari
wants
to
say
something,
but
it
looks
more
or
less
ready.
I
I
guess
if
here
is
on
the.
C
I
don't
know
if
he
is
in
the
meeting
and
wants
to
say
something.
Then
we
had
this
large
certificates,
which
was
approved
by
the
iesg
but
pending
pending
a
document
update-
and
I
submitted
an
update
yesterday.
So
now
it's,
I
guess
with
you
roman
to
I
guess-
send
it
to
the
rfc
editor.
A
Yeah,
I
haven't
I'll,
take
a
look
and
then
yeah
assuming
it's
fine,
we'll
keep
it
moving.
C
Sounds
good
using
epls
with
dls
1.3
is
scheduled
for
the
isg
telechart
on
17th
of
december
we
got
like
a
couple
of
emails
from
ayanna
that
we
need
to
clarify
the
tls
exporter
labels
that
we
are
registering
if
it's
okay
with
dtls
and
whether
it's
recommended
so
I
plan
to
add
those
information
to
the
inner
section
and
submit
a
new
version.
C
Hopefully
today,
but
I
guess
more
importantly,
we
are
waiting
for
a
review
from
harness.
He
had
promised
that
he
will
go
over
the
document
once
more
and
thank
you,
hannes
already,
for
sending
the
reviews
thus
far
so
yeah
then
epls
with
tls
1.3,
hopefully
will
be
done
by
december.
If
aka,
the
5448
best
document
is
spending
some
synchronization
with
3gpp.
So
we'll
wait
for
that.
C
I
think
yari
and
vesa
who
are
co-authors,
are
also
like
discussing
this
in
3gpp
and
basically
figuring
out
how
how
to
ensure
that
both
the
document
here
in
the
ietf
and
the
specs
in
3gpp
are
are
completely
in
sync
and
don't
leave
something
to
to
be
misunderstood.
So
we
wait
for
a
document
update
on
that
too
and
yeah.
We
had
our
first
rfc
published
between
108
and
109,
which
was
rfc
8940,
and
thanks
to
alan
for
doing
the
work.
E
Yeah
hi
hi
cho,
hi,
mohit
yeah
I've
started
doing
the
review
already
this
week
was
a
little
bit
busy,
but
yeah
thanks
for
the
updates
mohit,
I
definitely
much
better.
The
document
is
much
better
now.
I
think,
from
a
readability
point
of
view,
so
that
only
maybe
knits
here
and
there,
but
nothing
nothing,
really
substantial.
C
B
Great,
so
I
think
we'll
move
on
to
our
to
either
who's
going
to
present.
Is
it
going
to
be
owen
or
dan
for.
G
G
G
Yeah,
perfect,
okay,
so
this
is
tls
proof
of
knowledge,
myself
and
dan
I'll.
Just
give
you
some
background
context.
First,
on
the
wi-fi
alliance
device
provisioning
profile.
So
what
wi-fi
alliance
tpp?
Does
it
defines
how
a
supplicant
bootstrap
keypair
can
be
used
to
bootstrap
the
supplicant
security
against
the
wi-fi
network?
G
Dpp
gives
the
supplicant
to
guarantee
that
it's
connecting
to
a
network
that
knows
its
booster
public
key
and
just
some
information
on
what
this
butcher
public
key.
Is
it's
encoded
using
a
rfc,
5280
subway
public
key
info?
It's
a
rocky
pair.
It
doesn't
necessarily
have
to
be
part
for
pki.
It
may
be
static,
embedded
in
the
supplicant
firmware
printed
on.
It
may
be
delivered
via
printing
on
a
qr
label
included
in
a
bit
of
materials,
etc
or,
alternatively,
the
bootstrap
key
may
be
dynamically
generated
and
displayed
on
the
gui.
G
If
your
device
that
you're
trying
to
bootstrap
has
a
suitable
display,
we
want
to
reuse
the
same
booster
public
key
to
enable
the
device
to
securely
bootstrap
against
a
wired
network
using
etls
via
tls
extension.
G
And
what
this
means
from
a
deployment
perspective
is
that
if
a
device
supports
both
wi-fi
and
wired
networks,
the
same
qr
codes,
the
same
bom
et
cetera,
may
be
used
to
establish
trust
across
both
wi-fi
and
wired
networks
and
just
at
the
very
bottom.
There.
I've
given
an
example
of
the
asn-1c
encoding
of
a
public
subject:
public
key
and
what
that
looks
like
in
qr,
and
this
is
all
defined
in
the
dpp
spec.
G
G
That's
called
a
dpp
configurator,
so
typically
this
could
be
mobile,
app
or,
alternatively,
the
configurator
could
be
embedded
into
the
wi-fi
access
point
and
proof
of
knowledge
is
carried
out
via
divi
helmet
exchange
and
between
the
configurator
and
the
supplicant,
and
it
uses
the
booster
key
of
the
supplicant
and
the
configurator
generates
an
ephemeral
development
key
as
well,
and
the
supplicant
proves
it
knows.
The
private
key
of
the
booster
key
pair
and
the
configurator
proves
that
it
knows
the
public
key
to
boost
your
key
pair
and
then
a
secure
step.
G
A
secure
channel
is
established
and
step.
Three
network
information
is
securely
exchanged
and
then
step
four.
The
supplement
attaches
to
the
network.
So
in
summary,
the
the
configurator
and
the
supplicant
establish
a
secure
handshake
where
the
configurator
proves
to
the
supplicants
that
it
knows,
the
supplicants
puts
their
public
key.
The
supplicant
proves
it
knows
a
private
key
once
that
secure
channel
is
established,
the
configurator
imprints,
the
supplement
with
network
information
and
network
credentials,
and
then
the
subsequent
will
attach
to
the
network.
G
And
so
what
we
want
to
do
for
wired
for
wired
lan
is
the
the
public
key
of
the
booster
key
is
scanned
into
the
network,
are
known
by
your
aaa
or
your
epls
server.
G
The
raw
public
key
and
the
server
generates
it's
a
thermal
key
pair
and
then
the
two
sides
can
complete
that
second
divi
helmet
exchange,
so
both
different
helmet
calculations
are
injected
into
the
key
schedule,
using
the
mechanisms
outlined
in
the
draft
of
reference
there
and
there's
also
the
alternative
draft,
which
is
which
is
referenced
in
in
our
document.
The
hybrid
design
draft,
so
there's
multiple
ways
of
figuring
out
how
to
inject
that
second
piece
of
information
into
the
key
schedule.
G
So
these
these
are
extracts
from
the
draft.
It
shows
you
the
shape
of
the
bootstrap
key
extension
and
that
extension
can
be
sent
to
either
a
client
law
or
server
law
in
a
client
at
all.
It's
just
a
hashed
reference,
a
hashed
reference
to
the
public
keys
that
allows
the
server
to
look
up
the
public
key.
Unlike
a
standard
key
exchange,
you're
not
selling
the
full
raw
public
key
you're,
sending
it
a
hash
representation
which
allows
the
server
to
look
up
the
public
key
and
in
the
server
law.
G
The
server
is
exchanging
their
ephemeral,
difficult
key,
their
second
department.
If
you
haven't
key
alongside
the
standard
key
exchange,
so
you
can
see
that
illustrating
the
call
from
the
bottom
left.
The
client
sends
the
bootstrap
key
and
it's
client
load.
The
server
sends
back
it's
a
corresponding
bootstrap
ephemeral
key
in
its
server
law.
G
So
what
this
means
for
an
operator
perspective
is
everyone
is
happy.
If
you
have
a
device
that
you're
trying
to
onboard
the
device
has
a
an
associated
bootstrap
key,
which
could
be
embedded
in
the
firmware
dynamically
generated
on
a
label
whatever,
and
that
qr
code
is
scanned
into
the
network
and
regardless
of
whether
you're
connecting
device
via
wired,
using
dpp
or
via
sorry,
by
wireless
using
dpp
rfi
wired.
G
G
All
of
the
existing
tls
security
proofs
should
still
be
applicable
and
the
security
proofs
that
will
be
defined
under
their
touchdown
in
the
highland
draft,
but
they're
not
fully
fleshed
out
should
handle
the
key
schedule
changes
as
well,
so
we
shouldn't
have
any
work
to
do
there
and
in
terms
of
bootstrap
key
security.
G
Tls
proof
of
concept
has
exactly
the
same
security
stance
as
the
wi-fi
alliance
tpp
with
respect
to
those
bootstrap
keys.
So
for
dpp,
if
you
know
the
bootstrap
public
key,
you
can
claim
the
device
and
exactly
the
same
is
applicable
here
for
tds
proof
of
knowledge
when
you're
doing
unwired.
If
you
know
the
booster
public
key,
then
the
network
can
claim
the
device
so
we're
not
making
any
changes
to
the
overall
security
stance
there.
G
We
do
have
working
code,
we
will
just
work
in
tls.code.
That's
been
up
on
it's
up
on
github
for
quite
a
while.
Now,
for
since,
before
the
last
itf,
it's
built
using
it's
built
on
top
of
the
standard
goal
line,
mid
stack
that
would
that
the
guys
in
the
tls
working
group
have
done
loads
of
proof
concepts
on
top
of,
and
this
last
slide
discussion
and
next
steps.
G
There's
three
general
work
areas
here:
one
is
defining
the
tls
extensions
to
transport
that
booster
key
and
that's
a
pretty
small
trivial
piece
of
work.
Second,
is
the
enhancements
to
the
key
schedule
to
inject
that?
Second,
if
we
have
an
exchange
into
the
key
schedule
and
we're
hoping
to
piggyback
on
one
of
the
existing
drafts,
either
holland,
one
or
the
hybrid,
the
hybrid
key
exchange
one,
there
will
be
some
per
tip
extensions,
defined
and
required
to
leverage
how
to
define
how
to
leverage
that
utilis
proof
of
knowledge
handshake.
G
That
work
is
still
that
work
still
needs
to
be
completed
and
with
some
general
discussion,
questions
here
well,
obviously,
the
first
one
is
to
run
a
general
interest
in
this
and-
and
the
other
question
is:
where
does
this
work
fit?
And
we
could
cover
this
in
one
document
that
it
currently
is?
Or
do
we
split
it?
G
G
Did
we
start
an
emu
move
to
tls
says:
do
we
have
to
split
some
of
the
work
between
emu
and
tls
and
those
are
the
kind
of
things
we'd
like
to
discuss
and
that
is
it
that's
the
end
of
the
presentations,
it's
pretty
short
and
but
we
feel
it's
a
it's.
A
pretty
elegant
solution
for
security,
bootstrapping,
a
device
onto
a
wired
or
wi-fi
network
and
the
the
there
is
working
code.
G
B
I
don't
see
anybody
in
the
queue,
but
I
guess
I'll,
you
know,
ask
a
couple
questions,
so
we
this
is
using
both
a
new
extension
and
the
hoiland
draft,
and
so
those
are
two
pieces
that
need
to
be
kind
of
reviewed
and
worked
out.
B
I
think
right
now.
I
don't
think
if
I
remember
correctly,
hoiland
isn't
a
working
group
item.
Yet
that's
correct,
that's
correct,
it's
not
sure
so
yeah
and
I
think
there
is
interest
in
it,
but
the
word
group's
kind
of
been
working
through
some
other
items
and
that
hasn't
come
up
again
yet
so
that's
probably
something
we
want
to
I'll,
probably
talk
with
jonathan
and
other
folks
and
see
what
their
plan
is
with
that
draft
and
as
far
as
the
extension,
I
think
you
know.
B
Certainly,
I
don't
know
that
the
extension
needs
to
be
done
in
tls,
especially
since,
like
you're,
you
know
you're
going
to
be
using
trying
we'll
we'll
try
if,
if
you're,
using
the
hoiling
draft
and
you're
using
sort
of
a
standard
way
to
kind
of
mix,
things
in
you
know
that
that
would
be
reviewed
by
the
tls
group,
which
would
probably
be
the
most
concerning
part.
B
But
yeah
I
don't
necessarily
have
a
too
much
of
an
opinion.
Do
you
see
use
of
this
outside
of
dpp
and.
G
Well,
these
cases
that
we're
currently
targeting
the
use
case
that
we're
currently
targeting
just
putting
on
my
cisco
hat
at
the
moment,
we're
certainly
talking
to
to
operators-
and
this
is
a
problem
that
they
need
to
solve
and
they
have
a
serious
problem
with
security,
onboarding,
sensors
and
devices
onto
wired
networks.
G
I
see
elliot,
is
in
the
queue
waiting
to
talk
so
I'll
actually
defer
to
audience
to
see.
Do
we
see
use
of
this
outside
of
eep.
H
Hi
good
good
morning,
good
afternoon,
good
evening,
so
clearly
there's
a
there's,
a
pretty
clear
use
case
for
eat,
but
I
wouldn't
exclude
the
idea
that
it
might
be
used
elsewhere
at
a
higher
layer
right,
but
that
doesn't
mean
the
work
couldn't
be
done
in
emu.
It
just
means
that
we
shouldn't
write
the
code.
We
shouldn't
write
any
extensions
that
you
know
that
would
exclude
the
use
of
email.
G
That
could
the
influence
of
the
draft
as
well
and
how
many
drafts
we
write
and
it
may
make
sense
to
have
the
tls
extensions
in
a
short,
separate
document.
So
that
is
not
like
bound
to
an
emu
draft.
If
that
makes
sense.
C
J
But
I
guess
my
question
or
comment.
I
had
started
to
say
in
the
jabber
room,
but
it
seems
like
we're
using
a
standard
private
key
pair
for
the
bootstrapping
keys
here,
and
I
was
wondering
if
there
was
a
way
that
we
could
be
able
to
use
like
threshold
crypto
instead
to
fulfill
the
same
goals
without
sort
of
relying
on
this
weird
mechanism
where
you
are
not
treating
the
public
key
as
or
so
you're
you're
treating
the
public
key
as
something
that
is
not
widely
distributed.
Like
it's
supposed
to
be
secret
as
well.
G
So
if
I
can
answer
well,
I
I
just
see
daniel's
in
the
queue
as
well,
but
one
answer
I
have
is:
we
haven't
considered
threshold
crisp
crypto,
but
we
had
been
looking
at
complete
reuse
of
the
dpp
bootstrap
key.
So
we
want
on
the
bootstrap
key
and
dpp
is,
is
a
currently
defined
and
published
wi-fi
line
standard,
and
we
want
to
reuse
that
exactly,
as
is
as
the
bootstrap
key
and
now
I
don't
know
whether
dpp
is
uninterested
moving
to
some
kind
of
threshold
of
crypto.
I'll
refer
to
that
on
that.
F
And
go
ahead:
okay!
Thank
you.
So
I
I'm
not
sure
whether
threshold
crypto
would
work.
But
that
said,
you
know
that's
an
interesting
comment.
F
What
I
wanted
to
say
was
that
you
know
there's
a
a
a
discussion
of
using
the
hoilo
work
in
tls
to
do
the
extended
key
schedule,
and
you
know,
even
if
that
isn't
adopted,
something's
going
to
get
adopted,
because
tls
needs
to
deal
with
the
post-quantum
crypto
issue
and
so
they're
going
to
they're
going
to
come
up
with
a
way
to
inject
random
goo
into
the
tls
key
schedule,
and
we
can
just
use
whatever
that
that
technique
is,
if
it's
not
the
the
technique
that
that
we're
specifying
now.
J
Definitely
yeah,
I
considered
saying
something
similar
as
well,
but
I
think
we're
all
on
the
same
page
in
that
aspect
and
and
thanks
to
both
of
you
for
sort
of
clarifying
the
the
threshold
of
crypto
and
then
wanting
to
reuse
the
dppkey
point
I
had
missed
that
part.
So
thanks.
C
Queue
not
anymore,
so
there
was
just
one
comment
from
era
mcdonald
that
I
guess
I
should
say
at
the
mic.
She's
suggests
keeping
tls
extension
in
the
tls
working
group
to
ensure
review
by
smes.
I
feel
the
same.
I
think
our
job
emu
will
be
much
simpler.
B
G
Paul
stood
into
the
chat
as
well,
the
other
draft
that
we've
referenced
as
the
alternative
schedule
import
and
it's
the
the
hybrid
design,
one
that
has
been
a
draft
adopted
by
tls.
So
we
looked
at
both
we
implemented.
What
looked
like
the
simplest
and
most
concrete
thing
at
the
time
six
months
ago,
which
was
the
highland
draft.
B
Okay,
I
think
you
know
it
would
be
good
to.
I
think
it
would
help
your
case
in
tls.
I
don't
know
how
much
interest
there
will
be
in
in
there
for
this
particular
thing.
We
can
certainly
check
that
out
on
its
own,
but
if
this
is
something
that's
of
interest
within,
you
know
the
emu
space.
I
think
that
kind
of
helps
the
case
of
of
working
on
an
extension
either
in
in
tls
or
or
in
this
working.
F
C
There's
a
question
in
jabber:
I
don't
know
if
dan
or
one
you
want
to
answer
john
frederick
asks,
will
the
server
still
authenticate
itself
against
the
client
using
a
certificate
or
is
the
public
key
of
the
client?
The
only
item
that
the
server
uses
to
authenticate.
G
G
E
Question
hi
hi:
this
is
hannes.
I
was
wondering
whether
you
couldn't
just
reuse
the
raw
public
key
mechanism
out
of
the
box.
K
E
G
Case
also,
okay,
so
the
raw
public
key,
the
raw
public
key,
remembers
the
client's
key
and
there's
currently
no
tls
mechanism
for
a
server
to
prove
it
knows
the
client's
public
key.
G
B
Okay,
so
I
think
what
we
would
want
folks
to
do
is
is
read
the
draft,
so
maybe
posting
it
to
the
list
and
asking
for
some
review
would
be
good
so
that
we
can
see
what
the
interest
is
in
the
working
group.
C
B
Yeah,
I
would
definitely
think,
should
post
something
to
the
list
and
and
see
if
we
can
get
some
discussion
on
it.
You
know
irregardless
of
you
know
when
we
would
present
it
in
the
working
group.
B
F
B
We
we
can
do
a
show
of
hands
right
now
to
see
what
the
interest
is
so
with
the
interest
would
be,
or
the
question
would
be.
Do
folks.
B
Is
this
this
draft
or
this
this
topic
something
emu
should
work
on.
G
Like
a
the
closest
alternative
that
emu
is
currently
working
on
is
is
noob
noob
that
this
this
mechanism
is
currently
defined
only
goes
in
one
direction.
B
Yeah
sure,
so
I
think
that
you
know,
I
think
the
question,
though,
is
is
we
we
have
noob
is.
Is
this?
Is
this
a
mechanism
that
people
think
would
you
know
would
be
a
good
topic
for
emo
to
work
on?
This
isn't
like
this
is
just
to
get
an
idea
of
what
people
feel
at
this
point
in
the
room,
or
did
I
misunderstand
your
quest
pure
comment.
C
C
B
Thing
here,
and
so,
if
you
think
this
is
a
topic,
the
group
should
work
on
so
there's
a
a
raise,
your
hand
and
there's
a
do
not
raise
your
hand
and
then
there's
you
can
you
know
not
do
anything
so
we'll
let
it
go
for
for
a
little
bit.
B
B
B
Okay,
so
so
there
is
some
interest,
so
I
think
that
that's
promising
I
mean,
I
think
it's
good,
that
it's,
you
know
kind
of
bridging
the
gap
between
what
dpp
does
and
what
can
be
done
on
wired.
So
it
definitely
seems
to
me
like
there
could
be
place
for
it,
so
we
we
need
to
have
more
discussion
on
the
list,
but
I
think
we
need
to
move
on
to
the
next
presentation
is
my
bling
on.
N
M
Okay,
hello,
everyone,
I'm
mei
lincoln.
This
is
my
first
print
presentation
on
the
emu
world
group,
so
my
draft
was
first
submitted
in
may
this
year
and
I
have
sent
emails
in
the
email
list
for
my
draft.
M
M
M
Certificates
are
really
now
used
in
fps,
but
still
some
problems
with
traditional
certificates,
such
as
management,
cost
lodge
certificate
chains
and
intermediate
certificate
is
not
so
friendly
to
the
constrained
environment
devices
such
as
iot
devices,
especially
for
weak
computing
power
devices.
So
I
think
there
are
two
solutions.
One
is
to
simplify
the
certificate
and
intermediate
validation
process.
Another
is
use
a
new
merge
search
for
the
authentication.
M
Of
course
we
choose
the
letter.
What's
your
public
key
in
the
owens
presentation,
most
of
us
have
no
republican.
That
means
there
is
no,
if
no
information
arden
than
the
public
key
for
cryptography,
sentient
sacred
kings
are
more
lightweight,
but
the
disadvantage
is
also
very
upwell,
such
as
the
dating
operation.
So
why
not?
Try
to
use
asmt,
cryptography
public
and
the
private
keys
are
involved.
M
M
In
the
rfc,
rfc6507
specified
an
identity-based
signature,
algorithms
using
elaptic
curve,
cryptograph,
the
mathematical
calculation
method
of
signature
and
the
verification
is
provided,
and
we
also
notice
that
fc
sam250
specified
using
raw
public
key
with
two
extensions,
makes
the
raw
public
key
and
variable
in
ts
and
dtls
next
slide.
Things.
M
Literature,
yes
think
so
the
however
draft
we
can
complete,
we
can
divide
into
three
parts.
Part
one
is
about
the
structure
of
the
raw
power
breaking
extension
and
part.
Two
is
about
ifts,
1.2
extends
republican
in
authentication
procedure
and
part
3
is
about
if
just
1.23
authentication
procedure
next
slide
thanks.
M
M
Server
certificate
type
here
means
the
types
of
server
certificate.
The
kind
is
able
to
process
this
client
certificate
type
means
the
type
of
certificate
the
kind
can
provide
to
the
server
after
receiving
the
current
loan.
The
server
will
respond
with,
say
hello,
and
these
two
new
extensions
also
exist
here.
M
From
the
hello
side,
the
current
certificate
type
indicates
the
selected
type
of
client
certificate
type
of
client
certificate
and
the
extension
of
server
certificate
type
here
indicates
the
type
of
certificate
certificate
in
their
following
certificate
load.
What's
more
important
is
the
extension
of
certificate.
M
M
The
third
one
is
the
hash
value
after
us
algorithms,
fabric
parameters
after
receiving
their
message
from
the
server
the
quite
well
verified
and
the
signature
message
same
id
and
the
public
parameters
will
be
their
input
and
then
this
the
peer
will
verify
their
signature.
If
success
declined
will
also
send
their
own
certificate
with
the
same
form
of
the
server
after
several
verified
the
client
certificate,
it
means
their
virtual
authentication
complete
and
the
whole
king
develop.
Derivation
is
also
complete.
M
M
M
This
slide
is
an
example
for
if
yep
ts,
1.3
version
identity
based
signature,
we
can
see
that
in
the
current
hello
there
are
three
extensions
signature,
algorithm
character.
M
What's
more,
the
certificate
here
will
carry
the
I
object:
identity
for
ecsi,
that's
the
wrong
mass
value
here,
and
the
hash
value
of
the
public
parameters
and
also
that's
their
id.
That's
their
public
key
and
also
their
certificate
request
will
carry
eccs,
I
sure
205
6
they.
That
means
they
want.
Their
current
site
will
also
use
their
easies,
as
I
sure
two
hundred
fifteen
six.
M
M
B
M
I
don't
get
a
key
point
of
your
question.
Does
that
mean
that
I
just
use
this
two
is
new
extensions.
M
Yes,
we
have
you,
can
if
you
familiarize
the
rfc
five
zero
seven,
you
can
know
the
extension
you
can
see.
The
extension
there
current
certificate
type
and
the
self-certificate
type
is
really
not
a
new
one.
Here.
M
We
also
have
a
draft
about
ts
ibs
it
have.
We
have
submitted
in
the
tl,
as
what
group
do.
E
Hi
hi,
this
is
hannes.
I
was
wondering
where
you
plan
to
use
your
document
like
this
specific
method,
like
what
deployment
environments
do
you
have
in
mind?
Sorry,
if
I
missed
that.
M
Oh,
I
think
the
most
disturbed
bros
scenario
is
for
the
lonely
passive.
I
ot
devices.
M
M
You
you
mean,
you
mean
the
drafter
of
for
one
haikuang
right.
C
So
I
don't
know
if
I'm
pronouncing
the
name
correctly.
It's
there
is
a
draft.
That's
draft
huang,
tls
ibe.
Is
this.
M
M
Ibe
is
a
very
good
thing,
but
it's
much
more
difficult
for
me.
So
I
just
use
ibs
here
not
encryption
here.
M
Just
use
ib
ask
for
the
identity
authentication,
but
not
use
the
encryption.
Crypt
crypto
here.
M
All
right,
pki,
the
traditional
pki
certificates.
C
Yeah
thanks
harness
asks.
Is
there
some
running
code
for
this
draft.
M
Oh
yes,
I
have
in
my
program
I
did
the
implementation
of
aps
ibs,
based
on
ips
1.2.
M
M
B
Yeah,
so
we
had
a
busy
time
with
tea
paradis.
Since
the
last
meeting,
I
think
we
we
had
a
total
of
10
errata,
published
or
or
submitted
against
teep.
I
think
on
the
list.
We've
resolved
six
of
those,
and
I
think
four
of
them
are
really
close,
and
I
wanted
to
kind
of
go
through
them
today
with
as
many
people
as
we
could
here.
B
I
did
get
some
comments
on
the
list
from
oleg,
so
I
know
he's
looked
at
them,
but
I
want
to
make
sure
that
that
people
have
looked
at
them
and
if
there
are
any
comments
today,
then
we
can
chat
about
it.
So,
let's
see
the
first
one
we
have
is
has
to
do
with
the
authority
id,
which
is
a
tlv,
an
outer
tlv
and
currently
the
draft
or
sorry,
the
the
the
rfc
says
that
this
should
be
mandatory
and
the
the
problem.
B
There
is
there's
another
part
of
the
rfc
that
says,
outer
tlbs
cannot
be
mandatory,
and
so
the
the
suggested
resolution
here
is
to
to
make
this
optional
now
realizing
that
optional
means
that
not
everybody
has
to
understand
this
tlv
and,
and
it
turns
out,
this
tlb
is
important
when
you're
processing
packs.
B
So
if
you're
using
packs
you
would
you
would
want
to
understand
this
tld
because
it
helps
you
to
to
manage
them
on
on
the
client.
But
if
you
don't,
then
it
would
be
optional.
C
B
B
But
I'd
you
know
if,
if
elliott
or
anybody
else
has
has
any.
B
So
jorge
said,
it
agrees
with
optional
all
right,
so
any
any
additional
concerns
about
making
this
optional.
B
B
All
right
here
this
is
one
that's
a
little
bit
tricky.
There
are
a
lot
of
places
in
the
document
where
the
term
eep
method
is
used,
and
in
a
great
many
of
them
it
really
means
eep,
authentication
method,
which
is
really
any
method,
except
for
the
eep
identity
method,
which
does
no
authentication.
B
So
you
know
there's
a
suggestion
to
modify
this
in
in
a
couple
places,
but
really
it
needs
to
be
modified
in
many
places.
B
So
my
thinking
here
is
that
this
is
something
that
we
would
hold
for
a
document
update,
because
there's
really
too
many
places
to
update
it,
just
doing
it
in
an
errata,
and
so
the
errata
would
be
hold
for
a
document
update,
and
we
can
place
a
note
explaining
the
reasons
why
we
want
to
make
that
change.
But
the
change
would
be
made
when
we
update
the
document.
B
The
eep
identity
method
is
the
it's
a
e
type
that
can
be
that
the
client
sends
the
server
sends
an
identity
request.
I
believe,
and
then
the
client
sends
an
identity
response
that
contains
an
nai
for
routing,
typically.
B
C
So
what
I'm
saying
is
that
for
me
and
hopefully
for
most
other
people,
I
could
be
wrong
if
method
generally
means
an
eep
authentication
method,
which
was,
I
guess,
the
intended
meaning.
When
deep
was
written
and
I
haven't
now
looked
at
the
deep
rfc.
Maybe
I
should
check
it
again,
but
if
there
are
some
instances
of
identity
method,
it
might
make
sense
to
like
change
those
to
an
identity
message
or.
B
So
I
I
think
I
think
you
know
fixing
this
in
in
multiple
other
places.
Is,
is
not
really
in
scope
for
an.
B
A
B
All
right,
so
I
I
mean
we
can
take
a
look
and
and
take
a
look
at
the
at
the
rfc
and
see
if
you,
if
you
think
there
is,
if
there's
a
simple
change
to
make
that
isn't
like
you
know
in
15
different
sections,
then
that
that
might
be
worthwhile
doing.
But
this
is
borderline
almost
an
editorial
change.
It
does
have
some
technical
meaning
in
some
places.
C
B
And
whether
you
send
an
interme
and
when
you
derive
keys
and
when
you
do
interme
intermediate
results
and
crypto
binding
and
so
the
real
question
was
it
didn't
really
specify
whether
you
did
crypto
binding
after
a
basic
password
exchange.
It
didn't
make
that
clear,
and
so
we've
made
some
modifications
here
to
kind
of
make
it
clearer
what
you
do,
and
so
that
also
we
defined
made
sure
the
procedure
for
when
you
don't
have
a
key
generated,
such
as
in
a
password
method.
B
B
When
no
key
is
derived
and
then
if
the
and
then
the
zero
msk
is
defined
as
just
an
msk
of
32,
octets
and.
B
B
B
B
Now,
but
did
anybody
who's
looked
at,
have
any
additional
comments
on
the
resolution
to.
C
C
B
Yeah,
here's
the
other
other
change
that
describes
what
happens
with
the
intermediate
result:
tlds
that
are
required
after
basic
password
authentication
and
eep
authentication
and
oh,
like
I
made
the
was,
I
think
the
change
was
with
the
next
one,
basically
on
what
you
had.
B
Which
is
again
having
to
do
with
the
intermediate
result
and
password
authentication.
O
C
O
B
B
Implementators,
if
you
could
look
at,
I
don't
know
if
that
would
fall
in
in
this
errata
or
one
of
the
other
ones.
But
if,
if
there's
a
sentence,
we
could
add.
B
Yeah,
that's
where
we
are
so.
If,
if
you
could
take
a
look
at
the,
I
think
that
that
could
be
a
fine
idea
if
we
just
if
it's
just
an
addition
in
one
of
the
current
errata,
which
I
think
it
could
fit
into
that
would
would
be
good
because
I
I
think
the
intention
is
that
if
a
method
is
generates
an
msk
that
it
should
be
used.
B
So
I
I
don't
think
it
would
be
worth
time
to
to
fix
this
here,
but
we
can
go
offline
and
and
work
through
what
what
the
change
would
be
thanks.
Okay,.
B
Okay,
then
5844.
B
Just
again
kind
of
clarifying
some
of
the
appendices
to
include
places
where
there
was
a
missing
crypto,
binding,
tlv
and
intermediate,
or
I
think
the
crypto
binding
tlb
seems
like.
Maybe
this
isn't
correct.
B
B
B
B
B
And
this
is
where
I
clarified
the
text
based
on
oleg's
comments
that
an
intermediate
result
indicating
success
must
always
be
accompanied
by
a
crypto,
binding
tlv.
This
is
discussed
elsewhere
in
the
document,
but
just
to
make
it
crystal
clear.
We
we
included
it
here
as
well.
B
B
B
Well,
so
are
there
any
other
comments
on
these
errata
or
any
of
the
other
errata
that
we
didn't
discuss?
Yet?
I
think
we
have
still
have
one
open
issue
which
oleg
brought
up,
which
we
can,
I
think,
that'll,
be
pretty
quick
to
resolve,
but
I'd
like
to
try
to
wrap
these
up
and
send
them
to
roman,
so
he
can
figure
out.
C
L
Yep
I
apologize.
I
sent
an
email
to
the
list
just
right
before
this
meeting,
so
I
doubt
anybody
has
had
time
to
review
it
and
think
about
it,
but
errata
5768,
the
chrome
code
is
too.
It
involves.
The
hmac
and
hmacs
have
different
lengths
depending
on
the
algorithm
used,
and
so
it
relates
to
changing
the
length
in
the
crypto
binding
tlv
to
be
variable
based
on
the
type
of
hmac
used,
which
sounds
good
to
me.
But
I
do
have
some
compatibility
concerns
because
the
existing
document
says
the
crypto
binding
tlv.
L
The
length
of
that
field
is
20
and
existing
implementations
use
that
length
of
20
and
they
truncate
any
output
that
is
longer
than
20.
They
truncate
it
to
20
octets.
B
Tlv
yeah,
so
then,
if,
if
existing,
I
think,
if
we're
going
to
increase
the
version
of
the
crypto
binding
tlv,
that's
like
a
document
update
and
what
we
could
do
in
the
errata
is
is
clarify
what
the
existing
behavior
is.
I
mean
if,
if
existing
implementations
are
doing,
you
know
shot
or
shot
256
and
then
truncating
it
to
20,
bytes
and
and
those
are
existing
implementations.
B
That
might
be
what
the
errata
should
say
and
then
in
a
document
update,
we
can
add
a
new
tlb
that,
or
you
know,
create
a
new,
a
new
version
of
the
crypto
binding,
tld.
L
I
agree
with
that
path
forward
and
we
can
we
can
clarify
what
the
existing
implementations
are
doing
on
the
list.
I
suppose
I
just
want
to
to
raise
that
concern
here.
Thank
you.
H
Elliot
you
are
next
hey
thanks
very
much.
This
is
just
a
weird
ietf
cause,
I'm
I'm
trying
to
follow
two
rooms
at
once,
I'm
supposed
to
speak
in
another
first
joe
and
jorge
and
oleg.
H
Thank
you
for
all
of
your
work
on
this,
and
it
was
a
lot
of
work
and
it
took
a
lot
of
effort
to
just
get
all
get
slogged
through
all
these
and
a
thanks
to
yoni.
Even
though
he's
not
here
first,
I
agree
with
the
last
point
that
that
one
should
be
hold
for
update,
but
the
reason
I
got
on
the
microphone
was
to
say
and
now
that
we're
getting
through
these,
I
want
to
unstick
the
the
deep
update
I
didn't
want.
I
couldn't
do.
H
I
didn't
think
we
should
start
that
until
we
got
until
we
slogged
through
these.
I
think
that
was
the
general
sense.
I
think
you,
you
said
a
meeting
or
two
ago
that
was
the
general
sense
of
the
working
group
that
we
should.
H
We
should
slog
through
these
and
then
do
the
deep
update
and
so
now
that
we've
done
that
I'll
unstick
that
trap,
but
I
think
we're
probably
going
to
rewrite
it
from
what
was
a
sort
of
a
brewski
oriented
draft
to
more
of
just
a
deep
update
draft
with
a
cup
with
a
couple
extra
tlbs.
H
What
I'd
like
to
do
is
invite
you
know,
jorge
and
yoni
and
others
to
to
really
work
with
me
on
that,
so
that,
as
as
we
go
through,
we
can
make
sure
that
all
of
the
errata
get
properly
incorporated
in
that
we're
making
sure
that
we're
comfortable
with
1.3.
H
I
think
owen
is
on
it
and
a
couple
of
others
we'll
probably
want
to
incorporate
a
few
other
things
to
make
sure,
for
instance,
that
the
the
poke
work
is
is
incorporated
depending
on
you
know
or
or
that
we
can
easily
update
on
top
of
the
update
as
it
were,
with
with
it
with
a
separate
drop
for
poke,
and
we
can
make
some
decisions
about
that
depending
on
timing.
So
again,
thanks
for
all
the
work
it
was,
it
was
a
lot
of
work
and
I
personally
appreciate
it.
B
Great
yeah
it'll
be
it'll,
be
good
to
kind
of
get
our
revision
going.
I
think,
especially
now
that
we
have
implementations.
I
think
the
this
experience
with
teep
really
solidifies.
I
think
the
areas
where
we
had
most
of
the
problems
are
areas
which
were
not
did
not
receive
as
much
implementation
at
the
time,
and
so
implementation
is
is
key
in
when
we're
working
through
these
issues.
H
B
All
right,
I
think
there
are
a
couple
items
to
take
so
jorge
thanks
for
for
raising
that
issue,
and
we
will,
you
know,
take
take
a
look
at
what's
on
the
list,
make
sure
our
implementations
are
aligned
and
I
think,
there's
one
other
kind
of
more
editorial
change
we
could
make
to
to
one
of
the
erratas,
but
I
think
that'll
help
understandability.
C
B
A
No
all
I
can
really
do
is
reiterate
the
things
that
elliot
said.
What
what's
happening
here
is
phenomenal.
I
love
the
process
kind
of
with
github
kind
of
on
the
clarity
for
every
other
working
group.
I
have
no
one
works.
The
errata
so
consistently
is
this.
So
this
is
a
tremendous
amount
of
help.
A
I
I
don't
really
need
anything
more
other
than
I
may
have
kind
of
the
occasional
questions
when
I
personally
drop
it
into
into
the
interface,
but
it
looks
like
you
have
all
the
necessary
things
and
you
everyone,
we've
walked
it
through
the
working
group
to
make
sure
that
we're
all
on
the
same
page.
So
this
is
phenomenal
and
when
you
say
you're
done,
I
mean
I'll
I'll
start
dropping
it
into
the
errata
interface.
Thank
you
really
again.
This
is
awesome.
B
All
right,
so
I
think
we're
done
with
this
for
the
time
being,
and
I
think
the
next
thing
was
an
update,
some
updates
on
eep
noob.
Do
you
wanna?
Are
you
giving
those
mohit.
C
Yeah,
if
you
can
share
the
slides,
that
would
be
great
eliot
by
the
way.
Are
you
still
on
the
queue
or
just
accidental.
C
So
yeah
hi
this
is
a
short
update
on
eat.
Noob,
I
think
by
now
people
are
familiar
with
what
this
method
does
so
next
slide.
Please
yeah
generic
authentication
framework
and
there's
no
methods
that
do
ob,
authentication
so
yeah.
This
is
a
new
method
for
doing
that.
Next
slide,
it
basically
does
user.
C
You
uses
a
user
assistant
out
of
band
authentication
in
either
direction,
whether
it's
from
the
peer
to
the
server
or
from
the
server
to
the
peer
and
supports,
basically
any
type
of
ob
channel,
whether
it's
qr
codes
and
dev
tag,
audio
blinking,
leds
and
so
on,
and
the
user
doesn't
have
to
perform
this
step
every
time,
because
we
have
this
fast
reauthentication,
where
previously
registered
devices
can
get
fresh
keys
without
further
user
interaction
next
slide.
C
So
this
is
the
rather
long
timeline
of
it
noob,
but
it
seems
we
are
getting
towards
the
end
and
hopefully
there
is
light
at
the
end
of
the
tunnel,
so
it
has
been
around
for
a
while.
There
are
several
implementations.
C
We
adopted
it
as
a
working
group
item
in
earlier
this
year
and,
like
the
draft
already
was
stable
when
it
was
adopted
and
now
like
we
got
like
reviews
from
harness
from
the
iot
directorate
from
security
directorate
and
basically
the
working
group
portions
have
been
updating
the
draft
based
on
on
these
reviews.
So
now
we
are
at
working
group
version
two.
So
that's
the
stage
we
are
currently
at
next
slide.
C
At
least
we,
the
authors
believe
that
it's
ready,
there's
three
implementations,
two
two
of
them
in
wps
applicant
and
host
apd,
and
one
in
contiki
there's
formal
models
in
mcrl2,
which
is
basically
for
checking
the
state
machines
and
dos
resistance
and
pro
verify
to
verify
the
security
goals.
So
the
difference
between
the
two
implementations
in
supplicant
host
apd,
the
first
one
is
more
feature
rich.
C
So
it
does
all
sorts
of
things
like
nfc
from
peer
to
server
and
server
to
peer,
whereas
the
the
third
implementation
on
this
bullet
list
is,
I
would
say,
more
streamlined
and
stable
and
less
feature-rich.
So
it's,
I
would
say,
like
less
bugs
and
less
features
and
more
stable
implementation,
which
was
completely
rewritten
earlier
this
year
after
the
draft
was
working
group
adopted.
C
So
the
first
implementation
was
done
mostly
by
us,
the
authors,
whereas
the
second
and
third
have
been
done
by
other
folks.
Next
slide.
C
So
what
was
happening
that
the
the
reconnect
exchange
was
not
triggered
in
the
state
machine
at
the
right
time,
and
this
caused
the
reconnect
exchange
to
fail
and
miguel
from
analog
devices
then
actually
send
the
pull
requests
to
the
implementation.
There's
several
others,
I'm
not
sure
if
they
want
to
be
named
here
and
listed
here.
C
Some,
of
course,
are
university
projects
which
are
obviously
nice,
but
maybe
the
the
I
some
of
these
poc
implementations
in
various
companies
sound
more
interesting
and
have
more
like
interesting
use
cases
where,
for
example,
one
of
the
emails
that
we,
the
authors
got,
was
that
the
deployment
scenario
is
we
come
with
our
own
access
point
and
then
configure
the
devices
and
then
take
away
the
access
point
and
transfer
the
devices
to
to
a
different
access
point.
C
C
So
the
only
remaining
issue
I
think
that
has
now
been
on
the
table-
was
basically
doing
sea
bar
versus
json,
and
this
came
up
in
dev,
talor's
directorate
review
and
as
well
as
michael
richardson,
who
was
saying
whether
we
should
move
to
seaboard
and
we
realized
that
seabor
is
going
to
be
a
major
change
at
this
stage
and
of
course
we
could
do
simple
mapping
of
json
to
seabor,
but
that
doesn't
really
get
you
the
gains
that
you
would
get
from
like
doing
native
c
bar
and
doing
the
entire
specification
in
cddl,
and
since
we
are
seeing
some
of
these
deployments
that
are
creeping
up
at
at
this
stage.
C
Maybe
it's
fine
to
just
stick
with
json
and
let
this
go
through
and
of
course,
eep
new
has
secure
version
negotiation,
so
you
can
perhaps
think
of
a
future
version
of
heap.
Nowhere
which
supports
seaboard,
although
I
think
we
will
have
a
presentation
after
this
on
epaddock,
which
perhaps
is
more
suitable
for
the
extremely
constrained
devices
where
you
know,
seabor
is
more
likely
to
be
a
necessity
rather
than
the
case
of
eat
noob.
C
So
for
now,
given
that
you
know
we
have
these
deployments
coming
up,
I'm
a
bit
concerned
that
moving
this
to
seabor
is
not
worth
the
benefits,
and
I
mean
if
there
is
strong
requests
in
the
future.
This
can
be
done,
but
at
this
stage
it
feels
like
the
really
constrained
devices
may
prefer
then
to
go
with
the
ad
doc.
For
example,
next
slide.
C
C
We
got
inr,
okay,
with
the
current
request,
whether
it's
for
the
method
type
or
the
special
domain
name,
and
I
would
like
to
thank
wes
hardiker
from
the
iab,
who
kind
of
did
the
hand
holding
and
explained
the
process
and
it's
nice
that
I
and
I
can
do
this
early
reviews
to
confirm
and
weed
out
any
issues
in
the
inr
requests
section.
So
the
authors
believe
it's
ready
for
our
last
call.
C
B
In
particular,
I'm
interested
in
anybody
has
any
strong
feelings
about
just
keeping
everything
in
json.
B
C
N
Can
you
hear
me?
Yes,
we
can
go
ahead.
Wait.
Thank
you
well,
thank
you
for
having
me
today.
I
am
edward
ingress
and
I'm
going
to
present
this
draft
published
with
dan,
garcia
and
rafa
marin.
The
draft
includes
the
initial
idea
of
the
new
method
for
it
based
on
adult
country.
Authentication
protocol
exercise
live
please.
N
Our
goal
is
to
design
an
alternative
solution
for
constrained
devices
using
nedoc
edoc
is
a
protocol
that
is
currently
under
development
at
the
lake
working
group
and
in
this
working
group
they
intend
to
produce
a
lightweight
authenticate,
the
key
exchange
for
oscar
usage
and
they
use
the
silver
protocol
and
recommend
the
use
of
co-op
to
transport
messages.
They
also
want
to
provide
entering
protections.
N
N
N
C
N
Yeah,
that's
a
great
question.
Actually
we
are.
We
have
that
in
mind.
We
wanted
to
to
plan
this
question
here.
There
are
two
options.
Of
course
we
can
use
the
server
as
the
initial
as
the
initiator.
So
the
fourth
message
will
be
a
message
with
data.
N
K
Yeah
there
are
some
privacy
implication
by
changing
who
sends
message
one
so
in
ad
hoc
and
all
the
similar
protocols
like
tls
103
and
so
on.
You
you
get
so
in
in
this
metric
flow.
The
server
will
send
its
identity
to
basically
anybody
asking
sending
a
doc
message
one.
K
So
if
you
return
so
you
get
active
protection
of
the
erp
peers
identity
in
this
message
and
only
passive
protection
of
the
server's
identity.
If
you
reverse
the
water,
you
get
stronger
protection
of
the
service
identity
and
weaker
of
the
pier
that.
C
N
Yeah,
that's
actually
that's
why
we
started
including
this
version
instead
of
including
the
other
option,
but
I
mean
I
don't.
I
don't
know
any
use
case
that
we
really
need
to
put
the
server
as
the
administrator,
but
maybe
the
someone
else
has
another
use
case.
N
Yep
thanks,
I
guess
thank
you
so
next
slide.
Okay,
thank
you,
so
edok
allows
to
define
which
protocol
is
responsible
for
ensuring
the
correlation
of
messages
so
either
itself
or
the
protocol
or
the
transport
protocol.
Sorry,
in
this
case,
the
if
protocol
is
based
on
the
locasted
procedure
and
guarantees.
The
ordering
of
messages,
therefore
edoc,
doesn't
need
to
use
its
internal
mechanism
for
correlating
messages.
That
means
that
we
set
the
variable
core
to
the
fixed
value.
3
next
slide.
N
N
My
intention
in
this
presentation
is
to
actually
present
the
idea
to
the
community
to
get
your
feedback,
and
our
next
steps
are
to
add.
The
feedback
received,
continue,
adding
the
protocol
details
and
work
on
making
the
design
compatible
with
this
draft
based
on
app
for
radios
next
slide.
Please,
and
to
end
this
presentation,
I
will
be
pleased
to
hear
from
the
participants
whether
they
think
this
draft
makes
sense
as
a
working
group
item
or
not,
and
please
be
welcome
for
any
other
comments.
Thank.
C
C
C
C
K
Ahead,
I
think,
as
support
is
draft,
I
think
it
may
be
a
bit
too
early
to
adopt
it.
K
N
N
Well,
I
guess
that's
all
thank
you
for
your
comments
and-
and
I
think
so
far
I
will
continue
working
on
parlor.
But
of
course
I
understand
your
your.
C
Yep,
I
guess
joe,
the
next
step
is
to
continue
the
discussion
on
this
draft
on
emu
and
lake
whenever
needed.
If
there
is
some
requirements
that
epad
dock
requires
from
from
a
dog
and
the
lake
working
group,
then
of
course
it
should
not
wait
for
a
dog
to
finish,
but
perhaps
we
can
revisit
this
next
next
idea.
C
B
Makes
sense
to
to
kind
of
you
know
just
let
let
ad
hoc
kind
of
go
through
a
cycle,
at
least
to
kind
of
get
get
it
a
little
more
stable,
and
then
you
know
we'll.
You
know
see
if
any
additional
issues
pop
out
of
that
and
and
then
we
can
start
thinking
about
adoption.
C
Yep
indeed,
we
seem
to
be
20
minutes
ahead
of
time.
Does
anyone
have
some
comments
before
we
close
the.
B
See
you
at
intf,
110
or
perhaps
at
some
interim
meeting
between
then.
C
Yeah,
I
would
just
like
to
thank
roman
for
taking
the
notes.
Thank
you,
roman.