OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

openc2-imple message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: IC-SC already exits


I do think we need to have a meeting because I think we are talking past
each other.
But since we don't have a meeting, I'll do my best via email.
I deleted the LSC off the email since I think this is an IS-SC
discussion.

Adam Bradbury gave a live demonstration at the face to face of a live
production system using prototype OpenC2. In that system multiple
vendors were involved. I believe that system used https api's. Mike
Stair described a system AT&T has operational (proof of concept but real
analysts are actually using it) that also has multiple vendors
interworking over OpenDxl. 

I propose it is worthwhile to have a standard way to use openc2 over
https api's. I propose it is also worthwhile to have a standard way to
use openc2 over OpenDxl and over OpenDSS and over other pub sub
standards. These are all for use cases within a single enterprise. I
suspect, but I won't presume to speak for them, that there are some
people who feel openc2 over STIX/TAXII could also be used within a
single enterprise. I'd also guess there is a larger crowd that feel
openc2 over STIX/TAXII could be used between enterprises. I feel it is
worthwhile to standardize each of those architectures. I do not think we
need to pick just one of them to allow interoperatibility. I don't think
forcing enterprises to change their architectures will be successful. I
think supporting their existing architectures so that they can use
openc2 will be more useful. If we had to pick one, I'd pick https api's
since that is what the vast majority of security devices use today. But
I don't think picking multiple will cause 'no random two vendors will be
able to communicate'. I think any vendor that supports https api will
interoperate with others that also support https api's - given we spec
it. I think any vendor that supports OpenDxl will interoperate with any
other vendor that supports opendxl to our IC-SC spec. Yes vendors that
only support https api's will not interoperate with vendors that only
support OpenDxl. That is no different than today and I consider that a
specious argument. And note even if an enterprise that did have the
problem that they wanted to interwork 'across' those two spaces - the
openc2 JSON would remain unchanged and it's just a normal http api to
opendxl conversion problem. We could even write a spec on the standard
way to do it if it's a realistic problem someone would have. Ditto any
other pair of transport protocols (eg OpenDDS and STIX).


Can you give an example of where you see the problem is? Ie give an
example of what can't interwork in a realistic architecture,
particularly one that you have an interest in (ie an IBM architecture or
an architecture of an IBM customer).


Duncan Sparrell
sFractal Consulting LLC
iPhone, iTypo, iApologize



-------- Original Message --------
Subject: Re: [openc2-imple] RE: IC-SC already exits
From: "Jason Keirstead" <Jason.Keirstead@ca.ibm.com>
Date: Mon, January 29, 2018 2:33 pm
To: duncan@sfractal.com
Cc: "openc2-lang" <openc2-lang@lists.oasis-open.org>, 
openc2-imple@lists.oasis-open.org

The problem is as Allen has pointed out - OpenC2 working over many
different protocols is not actually meaningful, because it will do
nothing for interoperability because no random two vendors will be able
to communicate. 

There has to be a standard protocol over which OpenC2 is interchanged -
if there isn't, then it's not really going to lead to interoperability,
as nothing can talk unless they just randomly decided to implement the
same carrier protocol in exactly the same way.

Sent from IBM Verse

duncan@sfractal.com --- [openc2-imple] RE: IC-SC already exits --- 

From:duncan@sfractal.comTo:"Jason Keirstead"
<Jason.Keirstead@ca.ibm.com>Cc:"openc2-lang"
<openc2-lang@lists.oasis-open.org>,
openc2-imple@lists.oasis-open.orgDate:Mon, Jan 29, 2018 2:22
PMSubject:[openc2-imple] RE: IC-SC already exits


Since we have existence proofs of openc2 working over existing transport
protocols, I had envisioned it was more of specifying all the details
instead of inventing a new protocol. Although if we did need to invent
one for some use case I haven't thought of,  I read the charter as it is
within scope as part of 'message transport'. The charter has "The SC
will leverage preexisting standards to the greatest extent practical and
it is within scope of this SC to identify gaps as they pertain to
command and control of cyber defense technologies". My recollection is
that wording was chosen specifically for this discussion - ie use
existing protocols if you can, but id gap if they don't meet the needs.



Duncan Sparrell
sFractal Consulting LLC
iPhone, iTypo, iApologize



-------- Original Message --------
Subject: [openc2-lang] Re: [openc2-imple] IC-SC already exits
From: "Jason Keirstead" <Jason.Keirstead@ca.ibm.com>
Date: Mon, January 29, 2018 2:09 pm
To: duncan@sfractal.com
Cc: "openc2-lang" <openc2-lang@lists.oasis-open.org>, 
openc2-imple@lists.oasis-open.org

Hey Duncan;

The problem is, from my experience, developing a protocol was never part
of that subcommittee's mandate. If it was, it is not in the charter. 

Developing a protocol is a big deal and should be the primary job of
whatever subcommittee it is under. It is far more reaching than an
implementation consideration.

Sent from IBM Verse

duncan@sfractal.com --- [openc2-imple] IC-SC already exits --- 

From:duncan@sfractal.comTo:"openc2-lang"
<openc2-lang@lists.oasis-open.org>,
openc2-imple@lists.oasis-open.orgDate:Mon, Jan 29, 2018 2:05
PMSubject:[openc2-imple] IC-SC already exits


Wrt Jason's comment:
> 'I 100% support the creation of any kind of subcommittee focused on the implementation of a standard protocol for OpenC2.'

Just to be clear - the IC-SC already exists. IC stands for
Implementation Considerations. Transport of openc2 is explicitly one of
it's mandates. The IC-SC stopped having meetings because there were
complaints of too many meetings and nothing to discuss. I was against
stopping but outvoted. 1 hour a month for this topic may have been too
much (I personally don't think so) but never is definitely too
infrequent. As I stated in my other email, I think the IC-SC should
reconvene.


Duncan Sparrell
sFractal Consulting LLC
iPhone, iTypo, iApologize



-------- Original Message --------
Subject: RE: [openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD Source]
RE: [openc2-lang] mandatory vs optional, Header, id, version, timestamp,
sender
From: "Jason Keirstead" <Jason.Keirstead@ca.ibm.com>
Date: Mon, January 29, 2018 1:46 pm
To: "Kemp, David P" <dpkemp@radium.ncsc.mil>
Cc: 'Allan Thomson' <athomson@lookingglasscyber.com>, 'Bret
Jordan' <Bret_Jordan@symantec.com>, "duncan@sfractal.com"
<duncan@sfractal.com>, "Brule, Joseph M"
<jmbrule@radium.ncsc.mil>, openc2-lang
<openc2-lang@lists.oasis-open.org>, Sridhar Jayanthi
<sridhar@polylogyx.com>

I 100% support the creation of any kind of subcommittee focused on the
implementation of a standard protocol for OpenC2... this has long been
the #1 gap I have seen in OpenC2, as a language without a standard
protocol to transmit it over is not going to go very far to encourage
interoperability.  I am very excited that it sounds like we will have
forward momentum!

On the topic of Open DXL.. I always feel compelled to point out that
OpenDXL is currently a closed protocol. The one and only implementation
of it is closed source - including the linked docker image (it is a
compiled binary-only distributable that is distributed under a special
McAfee license).  I've seen reference that McAfee plans to fully open
the protocol, however until such a thing is completed and available to
all under a standard open source license, I do not believe it is
appropriate for any OASIS-created standard to have references to said
protocol.

-
Jason Keirstead
STSM, Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security

"Things may come to those who wait, but only the things left by those
who hustle." - Unknown 




From:        "Kemp, David P" <dpkemp@radium.ncsc.mil>
To:        'Allan Thomson' <athomson@lookingglasscyber.com>, 'Bret
Jordan' <Bret_Jordan@symantec.com>, Sridhar Jayanthi
<sridhar@polylogyx.com>
Cc:        "Brule, Joseph M" <jmbrule@radium.ncsc.mil>,
"duncan@sfractal.com" <duncan@sfractal.com>, openc2-lang
<openc2-lang@lists.oasis-open.org>
Date:        01/29/2018 01:20 PM
Subject:        RE: [openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD
Source] RE: [openc2-lang] mandatory vs optional, Header, id, version,
timestamp, sender
Sent by:        <openc2-lang@lists.oasis-open.org>



I agree.  The working title is "Transport Implementation Considerations"
(https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.google.com_document_d_1Bz-5FWXOiYc9vmMS8rNEP1-2DZZgPzdeGoZMN6W5W9GSmdU_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=6IyVD_1ml2WOEtY8q0pZbBb1leFZ6ktAr9anVp_gFjM&e=)
and it will initially contain at least two transport protocols
(https/ajax and a pub/sub such as MQTT or OpenDXL*).   It couldn't hurt
to define a TAXII binding as well.



There is no dearth of options for bundling headers and messages together
in a document (for use outside of a protocol);  JWS (RFC 7515) bundles
Unprotected Headers, Protected Headers, Payload and Signature fields; it
can be used with a "none" signature algorithm and an empty signature
value (RFC 7518 Section 3.6) if integrity protection is not needed at
the document layer.



Dave





* For those who will ask, there is now an OpenDXL broker packaged as a
docker container:
https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_opendxl_opendxl-2Dbroker&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=i7U9t4sF-zFaeuaV0kbNq33zZQwI9QxN7fdDec8kzyI&e=.



-----Original Message-----

From: Allan Thomson [mailto:athomson@lookingglasscyber.com] 

Sent: Monday, January 29, 2018 11:33 AM

To: Kemp, David P <dpkemp@radium.ncsc.mil>; 'Bret Jordan'
<Bret_Jordan@symantec.com>; Sridhar Jayanthi <sridhar@polylogyx.com>

Cc: Brule, Joseph M <jmbrule@radium.ncsc.mil>; duncan@sfractal.com;
openc2-lang <openc2-lang@lists.oasis-open.org>

Subject: Re: [openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD Source]
RE: [openc2-lang] mandatory vs optional, Header, id, version, timestamp,
sender



I wasn't suggesting we reuse Bundle for OpenC2 objects.



I was suggesting conceptually that including header information that
comes with payload is a common concept that is helpful/useful in system
exchange and interoperability.



A couple of examples where header information is exchanged as part of
the protocol:



IPFIX
https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7011&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=vye40KgawTF9bfgK8QTYb1ozN1psdkC8S8kd9ma_eQI&e=

HTTP
https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7230&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=_XklyDamvyCOpONQt_MsG3rYEHIGXYbSRMyU3F3XlYI&e=



If OpenC2 is just a language then I would suggest we need to start
working on a protocol spec cause that’s what we need for products to
implement OpenC2.



Allan



On 1/29/18, 8:06 AM, "Kemp, David P" <dpkemp@radium.ncsc.mil> wrote:



    You left out:

    

    "Bundle is not a STIX object... Bundle is transient and
implementations should not assume that other implementations will treat
it as a persistent object."

    

    I'm all for re-using stuff that has already been written.  Package
up OpenC2 messages in a STIX Bundle.

    

    If for some reason STIX Bundle couldn't be used for OpenC2, we could
define an OpenC2 container that bundles together OpenC2 messages and
header info.

    

    Dave

    

    

    -----Original Message-----

    From: Allan Thomson [mailto:athomson@lookingglasscyber.com] 

    Sent: Monday, January 29, 2018 11:01 AM

    To: Kemp, David P <dpkemp@radium.ncsc.mil>; 'Bret Jordan'
<Bret_Jordan@symantec.com>; Sridhar Jayanthi <sridhar@polylogyx.com>

    Cc: Brule, Joseph M <jmbrule@radium.ncsc.mil>; duncan@sfractal.com;
openc2-lang <openc2-lang@lists.oasis-open.org>

    Subject: Re: [openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD
Source] RE: [openc2-lang] mandatory vs optional, Header, id, version,
timestamp, sender

    

    Dave - Strictly not true in all cases.

    

    A bundle object is one of the primary containers that is used to
exchange objects for STIX via collections and it has the spec version in
it.

    

    See Section 5: Bundle in the core spec for STIX 2.0.

    

    The intent of the Bundle object was to identify a 'packaged' set of
STIX objects and includes the version.

    

    Allan

    

    On 1/29/18, 7:45 AM, "openc2-lang@lists.oasis-open.org on behalf of
Kemp, David P" <openc2-lang@lists.oasis-open.org on behalf of
dpkemp@radium.ncsc.mil> wrote:

    

        This really shouldn't be so difficult to understand for people
familiar with CTI.

        

        TAXII is a transport protocol.  It can transmit STIX objects. 
The Version of the STIX object is not contained in the STIX object, it
is contained in the TAXII Accept header.  Section 3 Core Concepts:

        

            GET ...

            Accept: application/vnd.oasis.stix+json; version=2.0

        

        If TAXII or any other HTTP-based transport protocol is used to
carry OpenC2 messages, the OpenC2 version would likewise be carried in
the Accept header.

        

        Dave

        

        

        -----Original Message-----

        From: openc2-lang@lists.oasis-open.org
[mailto:openc2-lang@lists.oasis-open.org] On Behalf Of Bret Jordan

        Sent: Sunday, January 28, 2018 2:15 PM

        To: Sridhar Jayanthi <sridhar@polylogyx.com>

        Cc: Brule, Joseph M <jmbrule@radium.ncsc.mil>;
duncan@sfractal.com; openc2-lang <openc2-lang@lists.oasis-open.org>

        Subject: Re: [openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD
Source] RE: [openc2-lang] mandatory vs optional, Header, id, version,
timestamp, sender

        

        I think this is the heart of my frustration with this TC.  I
agree with you, that there needs to be some sort of initialization
process.  Otherwise how is a server to even know what it is you are
sending. 

        

        Some people are so worried about drawing an artificial line they
are forgetting about interoperability.  Any two vendors, under the
current specification design, will be able to be fully compliant with
the conformance clauses and will have no guarantee that they will be
able to talk to or work with anyone else.  

        

        I find that to be a fundamental problem.  There is currently no
guarantee for any vendor or device manufacturer that their
implementation they build will ever work with anyone else’s solution. 


        

        For example a network device or firewall vendor could go off and
build a solution based on all the verbs in OpenC2 and depending on how
they implement it, it is possible that no one else will be able to talk
to their equipment other than themselves.

        

        Building standards is hard.  And the longer we hold off on
discussing the purple elephants in the room, the more likely this will
never get adopted in mass.

        

        Bret

        

        Sent from my Commodore 64  

        

        PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415
0050

        

        On Jan 27, 2018, at 1:49 PM, Sridhar Jayanthi
<sridhar@polylogyx.com <mailto:sridhar@polylogyx.com> > wrote:

        

        

        

                         Bret, 

        

                         My understanding of network protocols is very
limited.  However, I am assuming I will have widespread agreement that
our language specs needs to be independent of the protocol. To achieve
this independence, we need some initialization language to help
establish an "OpenC2 connection" between devices/systems. Isn't this the
common thinking in the group? I am new to the group and may not have the
history of where exactly we are trying to fit in the stack, so I am
stating based on my understanding. Let me know if I am making a bad
assumption here.

        

                         Sridhar

        

                         --------------------------------------

                         Sridhar Jayanthi

                         Chief Executive Officer

                         PolyLogyx LLC.

                         Transforming Cyber Security

                         

                        
www.polylogyx.com<">https://urldefense.proofpoint.com/v2/url?u=https-3A__clicktime.symantec.com_a_1_Q0zYrBWEYFkbKF31GtI8O-2D9cn3Ba6GDcuvbOO7QpNUQ-3D-3Fd-3DJtx4Y1xT8xGfwjHwOG0jO-2DCWSYI2nvaM-2DuliHiQuSs5eGqbWQ0-2DavCZRSBDpCHdVUzBuOvxUZMf8DSavxoyQB2I07OZRKps18hTGyKiBqXdfA2AgXMnSV7AunFncMY521tqRStNNlufQoHDnfJIPX0P5OUTaDO-2DdAS0nV20hfC6cAjxOymA5Gi5VYyvtM8H5muHkSN8kobzDj2sqqGKg3cGogXOcTGKS18b1vvbNnAsQsK5FbvQO3XZlVFc39cxx3IRJSc99UGYE0RbANWr-2DzAz5xOGWmBxJ8ZyQ61r7Kwpzt7a-2DLLzID5prpUXteMvme3YTG-2DG2tZ4ItirgdPSioqXKgSvXt-2Dg-2DrQlqdQ6iJ-2DGo8pz-2DIgLWCe5dzCMFWB2hDq-5FNaaDSDv7FJKyansLs0-5FskBmMsLQ9-5FVo70sy990GcCMhjXtN4lAXxX6dACu9g5w9sI7Pj33dvAYCqVNTl3S2pvvI6-2DYWLdzlySb-5Fzq4vsSPg-253D-253D-26u-3Dhttp-253A-252F-252Fwww.polylogyx.com&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=isQRaTKicBF57GETeH7GbS9wxKrujLbSyAhgBccEKMI&e=>;


                         Cell: +1-858-205-2252

        

                         On Fri, Jan 26, 2018 at 1:08 PM, Bret Jordan
<Bret_Jordan@symantec.com <mailto:Bret_Jordan@symantec.com> > wrote:

                         

        

                                          I would like to dig a bit
deeper here...  

        

                                          

                                          

        

                                          So are you suggesting that
OpenC2 have some sort of channel binding with the protocol that is
carrying it?  Or are you suggesting that OpenC2 build in its own
negotiation protocol that sits on top of the transport ?

        

                                          

                                          

        

                                          Bret 

        

        ________________________________

        

                                          From: Sridhar Jayanthi
<sridhar@polylogyx.com <mailto:sridhar@polylogyx.com> >

                                          Sent: Friday, January 26, 2018
1:12:30 PM

                                          To: Bret Jordan

                                          Cc: Brule, Joseph M;
duncan@sfractal.com <mailto:duncan@sfractal.com> ; openc2-lang

                                          Subject: Re: [openc2-lang] Re:
[EXT] [openc2-lang] RE: [Non-DoD Source] RE: [openc2-lang] mandatory vs
optional, Header, id, version, timestamp, sender 

                                           

                                          Bret, 

        

                                          I can see the "handshake" word
may be misleading.  I meant whatever initialization kicks off a
connection between two OpenC2-compliant systems. No matter what
carrier/protocol the OpenC2 command is riding on, the OpenC2 systems
need to identify each other and register the connection - that's a good
time to exchange these once-per-session fields. In some ways we may make
better progress on this if we get started with the threads (use cases).

        

                                          Sridhar

        

                                         
--------------------------------------

                                          Sridhar Jayanthi

                                          Chief Executive Officer

                                          PolyLogyx LLC.

                                          Transforming Cyber Security

                                          

                                         
www.polylogyx.com<">https://urldefense.proofpoint.com/v2/url?u=https-3A__clicktime.symantec.com_a_1_-2D6Dv3h8tLUHl-5FnfTjd9PBLzKajSIb1Ksn5Vcd2o9JKY-3D-3Fd-3D-5FjUTT4qxCwq-5FM3ECVhAAjvwRDDIOnU-5FfQG-2DU1BwWwQgYs6sHwU8otjv9DkK1h8S7VOm5GcxROY3VPjvxzOL1Rm3D0vlLzOZ3Db5DtBPop0ySxJuF313LfZEWH-2DHWrieOKP-5FcfFvuG9tAzMCcXZT6pNcPsD35L9ZvLx8zHNCXovofj9tg8tavFAM5JkO26O6pvYjln52IG1bvzWmFMidYvzQjQk3i9WwdL5gNLBYiAmCviB3H-2DR4fBJlcxHFu0sKZ7uHzNy9-5FvC63xL1K-2DppD-2Dt9AAt9xbepGe2LQcVDTXrr1CxSkNWFB9lJvDcy5bVnrzIuKkl45ihp6KF4ONGLpITVLNv2CVCjDywjhd29rFvQro2dNN0C2jvt-5F9JQvaHmkqN3X-5FNv8lmyZzkJBZkd-5FJhttWNISVICaGmDcTaRtnoQm9j4ahgBVm6L6km-2Dw3LB1qm71abyQgfucuk0FNGhx8KYp-2DRQZtwhuIcNPHpoY9r1Gdg-253D-253D-26u-3Dhttp-253A-252F-252Fwww.polylogyx.com&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=FmXCaAdnlcMdGWMTi7X4JmvbBSB47yYVRs-TvcebFNw&e=>;


                                          Cell: +1-858-205-2252
<tel:(858)%20205-2252> 

        

                                          On Fri, Jan 26, 2018 at 12:05
PM, Bret Jordan <Bret_Jordan@symantec.com
<mailto:Bret_Jordan@symantec.com> > wrote:

                                          

        

                                                           OpenC2 is not
a protocol.  So how do you expect to do this during the handshake?  Do
we need to make OpenC2 a protocol?

        

                                                           

                                                           

        

                                                           Bret

        

        ________________________________

        

                                                           From: Sridhar
Jayanthi <sridhar@polylogyx.com <mailto:sridhar@polylogyx.com> >

                                                           Sent:
Thursday, January 25, 2018 10:36:01 PM

                                                           To: Bret
Jordan

                                                           Cc: Brule,
Joseph M; duncan@sfractal.com <mailto:duncan@sfractal.com> ; openc2-lang

                                                           Subject: Re:
[openc2-lang] Re: [EXT] [openc2-lang] RE: [Non-DoD Source] RE:
[openc2-lang] mandatory vs optional, Header, id, version, timestamp,
sender 

                                                            

                                                           I concur with
Duncan and Joe about the need to make these fields optional. However, we
need to make sure identification-related fields including versions and
sender can be established during initial handshake. I am not
overthinking this at this time since there could be nuances that will
become clear during our use-case exercises. As has been said by many
before me, we may end up correcting our decision in some cases when we
work through the use cases.

        

                                                          
--------------------------------------

                                                           Sridhar
Jayanthi

                                                           Chief
Executive Officer

                                                           PolyLogyx
LLC.

                                                           Transforming
Cyber Security

                                                           

                                                          
www.polylogyx.com<">https://urldefense.proofpoint.com/v2/url?u=https-3A__clicktime.symantec.com_a_1_-2DaKK5uImR6XL3nK8kA3rEsIJCffU4I8BhOwvytiWEFM-3D-3Fd-3Dsv7tsOLRgHSu0VhEMnOVOJNoR9UoYBCRAbxh5kds64eY0I36RiQpoNjY06gSqI0pZf9ZyldNIEvTx4DksLvIi9cxr7WTFLtO5LK7pnQ9RFdPsA8dayM2E33-2Dw3O2WDw8FYGWIr7ayTdC-5FA3Ox7DxNItMyrGJD1E88LzhK9RT0TTYwwrDhJ6ezXpJMPhXYpGMR-5F6AaFDoiOOcU0wosM67ap4C-2DrZK38rU5eZE5mBjLc9QO6IGsgavv0WRHq3eHKkx7p7-2DYRHoabjP36mO5NO88ox4lM3DvhGxU1N4EOgcAjZ-5FG656xAzXFafUaeOBTAmr9w-5FGz-2DLX83rS-2D6LwszgcxiJqd9pYTu2GhNsamKJiQePftzd4H52yliEnPIncVk6BnplPLF9FBekVtbm3JhgQH9kRKAiRRRj5eycwTIRai-2D9R4po1GClQAKKagGhCFa75IWV99y7lXhMbp12Xrub8W2k3uRkPsexJVRoUT8aDxSPg-26u-3Dhttp-253A-252F-252Fwww.polylogyx.com&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=F3CHGwWcIMr5BUlw46d8qIXGptx7kyy5wT-BOXBZsyM&e=>;


                                                           Cell:
+1-858-205-2252 <tel:(858)%20205-2252> 

        

                                                           On Thu, Jan
25, 2018 at 12:29 PM, Bret Jordan <Bret_Jordan@symantec.com
<mailto:Bret_Jordan@symantec.com> > wrote:

                                                           

        

                                                                        
   So Duncan and Joe are against it.  Allan, Bret, and Dave are for it. 

        

                                                                        
   

                                                                        
   

        

                                                                        
   Bret

        

        ________________________________

        

                                                                        
   From: openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> 
<openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> > on behalf of Brule, Joseph M
<jmbrule@radium.ncsc.mil <mailto:jmbrule@radium.ncsc.mil> >

                                                                        
   Sent: Thursday, January 25, 2018 9:58:53 AM

                                                                        
   To: 'duncan@sfractal.com <mailto:duncan@sfractal.com> '; openc2-lang

                                                                        
   Subject: [EXT] [openc2-lang] RE: [Non-DoD Source] RE: [openc2-lang]
mandatory vs optional, Header, id, version, timestamp, sender 

                                                                        
    

        

                                                                        
   Speaking as an OpenC2 TC member representing DOD and not as chair;  

        

                                                                        
    

        

                                                                        
   I agree with Duncan. 

        

                                                                        
    

        

                                                                        
         The focus of OpenC2 has been on unambiguous M2M exchanges and
we have always strived to be low overhead and agnostic of other
functional blocks.  These (and other) principles and assumptions have
been in place since the TC’s inception.   

        

                                                                        
         Any analysis for the inclusion (or exclusion) of a particular
feature should be optimized for operations rather than development.
Though I can appreciate the challenges that product developers face, as
a representative of an agency that is a non-trivial consumer of IT and
security products,  we are interested in operations. 

        

                                                                        
         The cost of additional fields is more than ‘a few bytes’. 
Need to consider complexity.  Vulnerabilities can be a function on the
order or 2^complexity.  Integration costs increase with complexity. 

        

                                                                        
         Simplicity and low overhead is beneficial when one considers
the environment, such as the verbosity of the C2, heterogeneity of the
environment, the number of connected devices which is growing
exponentially.  BTW I acknowledge that ‘exponential growth’ is
arguably the most abused cliché ever but is OK in this context. 

        

                                                                        
    

        

                                                                        
        There has been some discussion of ‘headers vs options field’
and ‘metadata vs header’.  I fail to understand why one needs to
have some options in header fields and other options in an option field
or some hybrid where we have optional headers and optional options.  Is
there a compelling reason to have ‘metadata’ type of options in one
field and different options in other fields?   I took the liberty of
googling IPV6.  Some of the IPV6 options (in the options field) include
routing, fragmentation, security payload header, authentication header,
host identity protocol and others.  IPV6 will probably succeed ;-)
despite the fact that different types of options were in the same
‘options’ field….

        

                                                                        
    

        

                                                                        
   In the context of particular options: 

        

                                                                        
        Command-id:  A valuable option and likely to be used widely, but
not mandatory.  There are use cases (interdomain effects based comes to
mind) where the id is not needed and there are others where it is
critical.  Of all the options discussed, id is the option that one could
make the strongest case for making mandatory, but at this point I
consider it optional. 

        

                                                                        
        Version: We certainly need to know the version and the versions
have to be compatible, but is it necessary to include on each and every
message?  Can the version be determined at initialization, or during a
negotiation procedure?  One could contrive a possible scenario where a
product has multiple capabilities and some of the capabilities are on
version 1 and others are on a different version, so having the version
on each and every message could be a useful option.  Having said that,
this is a hypothetical argument for an option not a mandatory header. 

        

                                                                        
        Timestamp:  A nice option, but clearly can be treated as an
external dependency. In addition to Duncan’s points, there are
numerous other protocols that address logging, audit etc. thus a
‘mandatory’ timestamp on every command is not needed for a wide
range of use cases/ environments.    

        

                                                                        
        Sender:  OpenC2 is at the application layer.  Lower on the stack
there are multiple fields that could be used for purposes of identifying
the sender.  At this point,  I do not see sender as a particularly
useful option, let alone ‘mandatory’ for each and every command, 
however this can be revisited once the use cases are brought to the LSC.


        

                                                                        
          

        

                                                                        
   VR

        

                                                                        
    

        

                                                                        
   Joe Brule

        

                                                                        
    

        

                                                                        
   From: openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> 
[mailto:openc2-lang@lists.oasis-open.org<mailto:openc2-lang@lists.oasis-open.org>
] On Behalf Of duncan@sfractal.com <mailto:duncan@sfractal.com> 

                                                                        
   Sent: Wednesday, January 24, 2018 11:08 PM

                                                                        
   To: openc2-lang <openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> >

                                                                        
   Subject: [Non-DoD Source] RE: [openc2-lang] mandatory vs optional,
Header, id, version, timestamp, sender

        

                                                                        
    

        

                                                                        
   Allan,

        

                                                                        
   We can agree to disagree. Your opinions are based on your 'experience
of protocol and product development making it easier to develop and
debug production code.'. Mine is based on my experience doing the same.
I'm guessing, but I don't know, that I put less emphasis than you do on
'design/debug' and more about steady state operations.

        

                                                                        
   If there are architectures/transport protocols/actuators where they 
are mandatory, then make them mandatory in those specs - not in the
language. I've explained my reasons why I don't think they should be
mandatory in the Language Spec for every command every time in all
architectures/transports/actuators. You disagree. Our views cancel each
other out. Let's hear from others.

        

                                                                        
    

        

                                                                        
   Duncan Sparrell

        

                                                                        
   sFractal Consulting LLC

        

                                                                        
   iPhone, iTypo, iApologize

        

                                                                        
    

        

                                                                        
                    -------- Original Message --------

                                                                        
                    Subject: Re: [openc2-lang] mandatory vs optional,
Header, id, version,

                                                                        
                    timestamp, sender

                                                                        
                    From: Allan Thomson <athomson@lookingglasscyber.com
<mailto:athomson@lookingglasscyber.com> >

                                                                        
                    Date: Wed, January 24, 2018 6:24 pm

                                                                        
                    To: "duncan@sfractal.com
<mailto:duncan@sfractal.com> " <duncan@sfractal.com
<mailto:duncan@sfractal.com> >, openc2-lang

                                                                        
                    <openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> >

        

                                                                        
                    Duncan  et al – 

        

                                                                        
                     

        

                                                                        
                    The suggestion to add these parameters was based on
experience of protocol and product development making it easier to
develop and debug production code. I agree in some use cases these
parameters might not be needed when things just work or everything is
homogenous environment but we are designing a specification for a
protocol that must support different tools, different versions,
different environments and therefore we need to design the protocol for
those cases. Including these fields is not a major problem for *any*
programming environment. All of the data is known by the programming and
environment that any tool will be deployed in. What harm exists if these
parameters mandatory? The # of bytes added to the message is minimal.
That is not a strong argument for making them optional. 

        

                                                                        
                     

        

                                                                        
                    Command-Id -> there is no reason why this can’t be
mandatory. This is a common construct across many protocols and
applications using those protocols. Optionality just introduces
complexity when implementations can easily support creating such a
parameter. This parameter is useful for tracking and also matching up
responses to commands. It allows products to show to users that commands
have been received correctly and what their responses were. If a use
case does not require this capability then just set the command-id to an
incrementing number and ignore the response’s value returning it.

        

                                                                        
                     

        

                                                                        
                    Version -> A version of protocol/schema being used
to construct a message is 100% always known. Programmers that write code
have to know what version of the protocol they’re writing to.
Including this parameter in the messages is useful for compatibility
checking, verification that one system is talking to another that is
compatibility and is just common sense for debugging problems. If there
are problems connecting systems together this will be one of the first
questions a developer will want on why the commands are not executing
correctly. For systems that don’t care about this checking then just
hard-code the value and ignore compability checks.

        

                                                                        
                     

        

                                                                        
                    Timestamp -> Same rationale as version. Every
logging function on the planet generates log messages with timestamps.
Time is known when a message is created. It is easily available to be
included in messages. Its useful for debugging and cross-correlation
across systems. If a system doesn’t care about it then just ignore its
value. Mandating that the field be filled in is hardly a problem for any
programmer to include a timestamp.

        

                                                                        
                     

        

                                                                        
                    Allan Thomson, 

        

                                                                        
                    CTO, Lookingglass Cyber Solutions
<">https://urldefense.proofpoint.com/v2/url?u=https-3A__clicktime.symantec.com_a_1_ML2Z6Jn9Hoe2B8yMwjYTgBjWiP64DvXPTB1-2DbPKi1Rk-3D-3Fd-3Doab0Np-2DpNxsUQWO8f74TxTvjCl9tW-5FcS0RjQ7Q4oh4qZl4mmjuQfIYakCB-5FkaemvaguuQgYlNAxGFE-5Fba-2DIBcJVMCFUjdzGEUOWcy2E5pGwzPqrWhgsMg1oHBgMSetzLGTD-5FRtpR9CD3p61IWrJk7dANVoyiSpUHhcWqbx4GKvHjdUwOEWh1RyNuRW2Kofj7hbbPjwbiYb2jZL4QMpZbupYHQEV9rNxanpOTz0lRVnH2rplUP7dEbkRvZgSArXwANznv1TnaBo2HTtGlXOXbPCsrdTzOGDduzDhPxkniqsy7OC21YSiIg4weXh2zQBAKHEOA-5FXZH-2DvXN7YoY77f3pWOODjYWwBhG9ZXrxrW-2DukmPVEQ2giHRFxoD-2DXtFH6TVJH2Sbaeb2tGbnFKddz2ELMnMFWJY6XijEDMvTmvaCY-2D-2DSD-5Fox5vSuMU0-2DJ-5F2uC-5FF7t-2DroXpalFYWFiVHF8ea0BZCteKsPRMeThUzelIR9T3xDLlGLisJttoaY6hIu-5F9pXhAgflxvu8t4S2nbZQdbaZOs8YG2q5m9w8k2eKCPevWXiA-253D-253D-26u-3Dhttp-253A-252F-252Fwww.lookingglasscyber.com-252F&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=30JCoKDgBJ9LYaxqh1T84N2P4p917Rgixs1FFIFq0h4&e=>;


        

                                                                        
                    This electronic message transmission contains
information from LookingGlass Cyber Solutions, Inc. which may be
attorney-client privileged, proprietary and/or confidential. The
information in this message is intended only for use by the
individual(s) to whom it is addressed.  If you believe that you have
received this message in error, please contact the sender, delete this
message, and be aware that any review, use, disclosure, copying or
distribution of the contents contained within is strictly prohibited

        

                                                                        
                     

        

                                                                        
                    From: <openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> > on behalf of
"duncan@sfractal.com <mailto:duncan@sfractal.com> " <duncan@sfractal.com
<mailto:duncan@sfractal.com> >

                                                                        
                    Date: Wednesday, January 24, 2018 at 6:51 AM

                                                                        
                    To: openc2-lang <openc2-lang@lists.oasis-open.org
<mailto:openc2-lang@lists.oasis-open.org> >

                                                                        
                    Subject: [openc2-lang] mandatory vs optional,
Header, id, version, timestamp, sender

        

                                                                        
                     

        

                                                                        
                    I’m sending this email as sFractal Consulting, not
as LSC cochair, as a followup to yesterday’s discussions at the LSC. 

        

                                                                        
                     

        

                                                                        
                    Optional/Mandatory -
Language/Actuator/Implementation 

        

                                                                        
                    There was discussion of whether a field should be
mandatory or optional. I think we need to take into account the
mandatory/optional decision is made in several places. If we make a
field mandatory in the language specification then it is mandatory in
all implementations in all architectures for all profiles. We should
remember that a field can be optional in the language specification but
required by either a profile (eg all firewalls SHALL implement
COMMAND-ID per language spec blah blah) or by an implementation
specification (eg all OpenDSS OC2 implementations SHALL implement
COMMAND-ID ...). I say this so you have context for what follows in the
email. In the LSC, we can only determine the optional/mandatory for the
Language Specification and will leave it to the AP-SC for profiles and
IC-SC for implementation.  

        

                                                                        
                     

        

                                                                        
                    COMMAND-ID 

        

                                                                        
                    Yesterday at the LSC I think we reached consensus
among those present that a COMMAND-ID capability should go in the
language. I propose the field name be “id”, not “command-id”. I
am distinguishing between what we humans refer to the field (COMMAND-ID
in upper case) vs the ascii string that goes in the JSON (“id” in
lower case). I think it’s important to remember there is hierarchical
context within the JSON and we don’t need to burden the field names
with information humans need when discussing it. “id” would be
unambiguous in the JSON to both machines and humans. 

        

                                                                        
                     

        

                                                                        
                    In the case of COMMAND-ID, my gut says it should be
optional in the language specification but I could be convinced to make
it mandatory. In my use cases, I need it sometimes and not others. Ie I
have use cases where I don’t need it but I don’t see it as an burden
to add it for those use cases. 

        

                                                                        
                     

        

                                                                        
                    HEADER, VERSION, TIMESTAMP, SENDER 

        

                                                                        
                    Where I feel more strongly is in the discussions of
other field we lumped with COMMAND-ID. For the benefit of those not
present at the discussion (and to record it for posterity since it’s
bound to resurface) there is a proposal on the table to distinguish
between two types of fields that are currently lumped under
COMMAND-OPTIONS. The proposal was made to pull out what (I think it was
Allan) called ‘HEADER’ or (I think it was Danny) called
‘METADATA’. I.e. they aren’t really options in the sense that they
are part of executing the command like the ‘DELAY’ option is. I
believe the “options” that got lumped in the HEADER category include
VERSION, TIMESTAMP, SENDER, and COMMAND-ID. 

        

                                                                        
                     

        

                                                                        
                    Although I maybe could be convinced to make
COMMAND-ID mandatory, I feel strongly that VERSION, TIMESTAMP, SENDER
should be optional in the Language Spec. One suggestion was to make
HEADER optional - but, if included, then ID, VERSION, TIMESTAMP, SENDER
are mandatory. I disagree with that approach - i.e. I would like to
optionally use ID without being forced to include the others. 

        

                                                                        
                     

        

                                                                        
                    SENDER 

        

                                                                        
                    In my use cases, I only send commands over a secure,
mutually-authenticated communications channel. I personally would never
recommend executing a security command based on the SENDER field - I’d
need something more for authentication, and if I had it - then I
wouldn’t need the SENDER field. I’d welcome someone documenting a
use case, that they need and would implement, where SENDER is needed. I
recognize I don’t know everything, but I would insist someone pull out
their black pen and document that they will use it (i.e. I personally
won’t be swayed by hypothetical, but I would agree based on a stated
need by a member that they need it and would use it). In the past, it
seems to come up in discussions where STIX COA use cases are mentioned.
Maybe I just don’t understand that use case and I’d welcome someone
documenting it. Assuming such a use case gets documented, I’d agree to
it as an option but not as mandatory. This might get us into the 80/20
discussions of which uses are more common (with implication that if 80%,
make it mandatory). But I feel those arguments belong in AP-SC and IC-SC
since I feel they will be actuator and architecture dependent. 

        

                                                                        
                     

        

                                                                        
                    TIMESTAMP 

        

                                                                        
                    In my use cases, I at the moment only send commands
point-to-point between a security orchestrator (SO) and an actuator (A)
over mutually authenticated (read the use case for details of CSA SPA
used) link carrying an API. In my use cases I do not need a TIMESTAMP in
the sense of ‘when was the command sent?’. As shown in my use cases,
I do need (as an option, i.e. not on every command, but sometimes) the
COMMAND-OPTION of allowing for the command to have a duration associated
with it (i.e. ‘classic’ command options). I recognize in the future
my security orchestrator may receive commands from ‘elsewhere’ (eg
if the Small Business Administration offered a STIX/TAXII feed with COA
in it, or my cloud providers, Amazon and/or RackSpace, send me openc2
about stuff they found). So I will distinguish between the SO-A and
SO-SO and confess I don't have fleshed out SO-SO use cases and maybe
TIMESTAMP makes sense there. If someone were to submit a black pen use
case that they need the HEADER TIMESTAMP, I’d agree to it as an option
but not as mandatory. 

        

                                                                        
                     

        

                                                                        
                    I’ll use a fictitious example to make my point on
language-optional, implementation-mandatory. Maybe the pubsub
implementors all feel TIMESTAMP is required on all OpenDSS
implementations (this is for explanatory purposes, I don’t know
OpenDSS well enough to know it this is true); then the OC2-on-OpenDSS
spec by the IC-SC could make TIMESTAMP mandatory while at the same time
their HTTPS-API spec specifies it SHALL NOT be used (again for
illustrative purposes). My point is it should be optional (if exists at
all - someone supply a use case) not mandatory in the Language
Specification. 

        

                                                                        
                     

        

                                                                        
                    VERSION 

        

                                                                        
                    Although I do agree we should future proof the
language specification to the extent possible, I don’t feel we need to
go overboard on future proofing. My use cases are all software in the
cloud so are less constrained then those dealing with hardware or less
updatable software. I feel that since no one implements OC2 yet, it's
not unreasonable to assume future implementations will have updatable
software. All my use cases are API’s. I believe API versioning is
dependent on language versioning and will suffice for all my needs. Ie
the language does not need to include a version in every command since
the API will. I will defer to what the IC-SC decides for OC2-on-API but
I will recommend in that group that the version be part of the URL (as
opposed to a passed parameter) - ie it will be mandatory. I recognize
there are other architectures than https API. Assuming such a use case
where VERSION is needed gets documented, I’d agree to VERSION as an
option but not as mandatory. 

        

                                                                        
                     

        

                                                                        
                    Duncan Sparrell

        

                                                                        
                    sFractal Consulting LLC

        

                                                                        
                    iPhone, iTypo, iApologize

        

                                                                        
                   
--------------------------------------------------------------------- To
unsubscribe from this mail list, you must leave the OASIS TC that
generates this mail. Follow this link to all your TCs in OASIS at:
<a target="_blank"
href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.oasis-2Dopen.org_apps_org_workgroup_portal_my-5Fworkgroups.php&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=ZXxPeZtkHJZJm7Gm8MX8mgVkjtnEF05YPcqnn-QXDv4&e=";>https://urldefense.proofpoint.com/v2/url?u=https-3A__www.oasis-2Dopen.org_apps_org_workgroup_portal_my-5Fworkgroups.php&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=k6Q07xZDujljzkKqZUfupXFUDIHGIiq-Sl_u1bw0hyA&m=58GIaCAHEiuaDAjDNjNNdV0tQn-UHdKKisva8m8mo40&s=ZXxPeZtkHJZJm7Gm8MX8mgVkjtnEF05YPcqnn-QXDv4&e=<https://clicktime.symantec.com/a/1/ejNqXPWYM5L8lslAzQ-_t5VfxMtHYuRxyGFFsmE2pFU=?d=oab0Np-pNxsUQWO8f74TxTvjCl9tW_cS0RjQ7Q4oh4qZl4mmjuQfIYakCB_kaemvaguuQgYlNAxGFE_ba-IBcJVMCFUjdzGEUOWcy2E5pGwzPqrWhgsMg1oHBgMSetzLGTD_RtpR9CD3p61IWrJk7dANVoyiSpUHhcWqbx4GKvHjdUwOEWh1RyNuRW2Kofj7hbbPjwbiYb2jZL4QMpZbupYHQEV9rNxanpOTz0lRVnH2rplUP7dEbkRvZgSArXwANznv1TnaBo2HTtGlXOXbPCsrdTzOGDduzDhPxkniqsy7OC21YSiIg4weXh2zQBAKHEOA_XZH-vXN7YoY77f3pWOODjYWwBhG9ZXrxrW-ukmPVEQ2giHRFxoD-XtFH6TVJH2Sbaeb2tGbnFKddz2ELMnMFWJY6XijEDMvTmvaCY--SD_ox5vSuMU0-J_2uC_F7t-roXpalFYWFiVHF8ea0BZCteKsPRMeThUzelIR9T3xDLlGLisJttoaY6hIu_9pXhAgflxvu8t4S2nbZQdbaZOs8YG2q5m9w8k2eKCPevWXiA%3D%3D&u=https%3A%2F%2Fwww.oasis-open.org%2Fapps%2Forg%2Fworkgroup%2Fportal%2Fmy_workgroups.php>;
 

        

                                                                        
   ---------------------------------------------------------------------
To unsubscribe from this mail list, you must leave the OASIS TC that
generates this mail. Follow this link to all your TCs in OASIS at:
<a target="_blank"
href="https://clicktime.symantec.com/a/1/ejNqXPWYM5L8lslAzQ-_t5VfxMtHYuRxyGFFsmE2pFU=?d=oab0Np-pNxsUQWO8f74TxTvjCl9tW_cS0RjQ7Q4oh4qZl4mmjuQfIYakCB_kaemvaguuQgYlNAxGFE_ba-IBcJVMCFUjdzGEUOWcy2E5pGwzPqrWhgsMg1oHBgMSetzLGTD_RtpR9CD3p61IWrJk7dANVoyiSpUHhcWqbx4GKvHjdUwOEWh1RyNuRW2Kofj7hbbPjwbiYb2jZL4QMpZbupYHQEV9rNxanpOTz0lRVnH2rplUP7dEbkRvZgSArXwANznv1TnaBo2HTtGlXOXbPCsrdTzOGDduzDhPxkniqsy7OC21YSiIg4weXh2zQBAKHEOA_XZH-vXN7YoY77f3pWOODjYWwBhG9ZXrxrW-ukmPVEQ2giHRFxoD-XtFH6TVJH2Sbaeb2tGbnFKddz2ELMnMFWJY6XijEDMvTmvaCY--SD_ox5vSuMU0-J_2uC_F7t-roXpalFYWFiVHF8ea0BZCteKsPRMeThUzelIR9T3xDLlGLisJttoaY6hIu_9pXhAgflxvu8t4S2nbZQdbaZOs8YG2q5m9w8k2eKCPevWXiA%3D%3D&u=https%3A%2F%2Fwww.oasis-open.org%2Fapps%2Forg%2Fworkgroup%2Fportal%2Fmy_workgroups.php";>https://clicktime.symantec.com/a/1/ejNqXPWYM5L8lslAzQ-_t-Your
data has been truncated. 
 
<a target="_blank"
href="https://clicktime.symantec.com/a/1/ejNqXPWYM5L8lslAzQ-_t5VfxMtHYuRxyGFFsmE2pFU=?d=oab0Np-pNxsUQWO8f74TxTvjCl9tW_cS0RjQ7Q4oh4qZl4mmjuQfIYakCB_kaemvaguuQgYlNAxGFE_ba-IBcJVMCFUjdzGEUOWcy2E5pGwzPqrWhgsMg1oHBgMSetzLGTD_RtpR9CD3p61IWrJk7dANVoyiSpUHhcWqbx4GKvHjdUwOEWh1RyNuRW2Kofj7hbbPjwbiYb2jZL4QMpZbupYHQEV9rNxanpOTz0lRVnH2rplUP7dEbkRvZgSArXwANznv1TnaBo2HTtGlXOXbPCsrdTzOGDduzDhPxkniqsy7OC21YSiIg4weXh2zQBAKHEOA_XZH-vXN7YoY77f3pWOODjYWwBhG9ZXrxrW-ukmPVEQ2giHRFxoD-XtFH6TVJH2Sbaeb2tGbnFKddz2ELMnMFWJY6XijEDMvTmvaCY--SD_ox5vSuMU0-J_2uC_F7t-roXpalFYWFiVHF8ea0BZCteKsPRMeThUzelIR9T3xDLlGLisJttoaY6hIu_9pXhAgflxvu8t4S2nbZQdbaZOs8YG2q5m9w8k2eKCPevWXiA%3D%3D&u=https%3A%2F%2Fwww.oasis-open.org%2Fapps%2Forg%2Fworkgroup%2Fportal%2Fmy_workgroups.php";>


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]