Intended status: Informational Expires: June 6, 2019 A. Hutton Atos R. Jesske Deutsche Telekom T. Stach Unaffiliated December 3, 2018

Similar documents
Intended status: Standards Track Expires: September 1, A. Hutton Unify L. Liess Deutsche Telekom T. Stach. Unaffiliated.

Intended status: Standards Track Expires: September 1, A. Hutton Unify L. Liess Deutsche Telekom T. Stach. Unaffiliated.

Internet Engineering Task Force (IETF) Request for Comments: Nokia Research Center May 2014

Internet Engineering Task Force (IETF) Request for Comments: 8035 Updates: 5761 November 2016 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track December 2011 ISSN:

Intended status: Informational Expires: March 7, 2019 Huawei Technologies N. Leymann Deutsche Telekom G. Swallow Independent September 3, 2018

Network Working Group Request for Comments: 4573 Category: Standard Track July MIME Type Registration for RTP Payload Format for H.

Intended status: Standards Track October 15, 2012 Expires: April 18, 2013

Intended status: Informational Expires: March 17, 2014 University of Napoli September 13, 2013

Internet Engineering Task Force (IETF) Category: Standards Track March 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015

Request for Comments: 3959 Category: Standards Track December 2004

Internet Engineering Task Force (IETF) Request for Comments: 8465 September 2018 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5725 Category: Standards Track ISSN: February 2010

Network Working Group. Intended status: Standards Track Columbia U. Expires: March 5, 2009 September 1, 2008

Internet-Draft Intended status: Standards Track Expires: January 1, 2019 June 30, 2018

Network Working Group. Intended status: Standards Track Expires: September 2, 2018 March 1, 2018

Internet Engineering Task Force (IETF) Category: Standards Track April 2010 ISSN: RTP and the Datagram Congestion Control Protocol (DCCP)

Network Working Group. Category: Standards Track June 2005

Internet Engineering Task Force (IETF) Request for Comments: 7244 Category: Standards Track. Huawei May 2014

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Internet Engineering Task Force (IETF) Request for Comments: R. Jain IPC Systems K. Rehor Cisco Systems, Inc. May 2014

Updates: 4448 (if approved) Intended status: Standards Track Expires: January 3, 2019 July 02, 2018

Obsoletes: RFC5285 (if approved) Intended status: Standards Track. October 28, 2016

Expires: April 11, 2019 October 8, 2018

Internet Engineering Task Force (IETF) Request for Comments: 6642 Category: Standards Track ISSN: June 2012

Internet Engineering Task Force (IETF) Request for Comments: 7403 Category: Standards Track November 2014 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track May 2018 ISSN: Negotiating Human Language in Real-Time Communications

Expires: April 19, 2019 October 16, 2018

Clarifications for When to Use the name-addr Production in SIP Messages

TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks

Internet Engineering Task Force (IETF) Request for Comments: Google Inc. October 2018

Internet Engineering Task Force. Intended status: Standards Track. June 7, 2014

Internet Engineering Task Force (IETF) Request for Comments: 8516 Category: Standards Track January 2019 ISSN:

Internet Engineering Task Force (IETF) January 2014

Intended status: Experimental Expires: January 6, 2011 Aalto University July 5, 2010

Internet Engineering Task Force (IETF) Request for Comments: 8441 Updates: 6455 September 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Informational. July Reclassification of Suite B Documents to Historic Status

Expires: April 19, 2019 October 16, 2018

Internet Engineering Task Force (IETF) Request for Comments: 7255 Category: Informational May 2014 ISSN:

Intended status: Standards Track Expires: April 26, 2012 Y. Ma Beijing University of Posts and Telecommunications October 24, 2011

Internet Engineering Task Force (IETF) Updates: 2474 August 2018 Category: Standards Track ISSN:

Expires: June 25, 2017 V. Pascual Oracle December 22, 2016

Network Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014

Internet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions

Internet Engineering Task Force (IETF) Request for Comments: Q. Wu, Ed. R. Huang Huawei November 2014

Category: Standards Track October Session Description Protocol (SDP) Simple Capability Declaration

Internet Engineering Task Force (IETF) Category: Standards Track September 2010 ISSN:

Intended status: Standards Track. Cisco Systems October 22, 2018

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins

Internet Engineering Task Force (IETF) Request for Comments: 7198 Category: Standards Track. April 2014

Internet Engineering Task Force (IETF) Request for Comments: 8262 Updates: 5368, 5621, 6442 Category: Standards Track October 2017 ISSN:

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN:

July 2, Diet-IPsec: Requirements for new IPsec/ESP protocols according to IoT use cases draft-mglt-ipsecme-diet-esp-requirements-00.

Internet Engineering Task Force (IETF) Request for Comments: 8142 Category: Standards Track April 2017 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017

Internet Engineering Task Force (IETF) Request for Comments: ISSN: May 2018

Internet Engineering Task Force (IETF) Category: Informational. May IEEE Information Element for the IETF

Category: Standards Track August 2002

Internet Engineering Task Force (IETF) Request for Comments: 8437 Updates: 3501 August 2018 Category: Standards Track ISSN:

SDP Capability Negotiation

Request for Comments: K. Norrman Ericsson June 2006

Internet Engineering Task Force (IETF) Request for Comments: ISSN: M. Petit-Huguenin Impedance Mismatch January 2015

Request for Comments: 4571 Category: Standards Track July 2006

Network Working Group. Expires: February 3, 2019 LabN Consulting, L.L.C. S. Ratliff VT idirect August 2, 2018

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: March 2014

Internet Engineering Task Force (IETF) ISSN: March 2017

Internet Engineering Task Force (IETF) Request for Comments: 6309

Internet Engineering Task Force (IETF) Request for Comments: 6843 Category: Standards Track. Q. Wu Huawei January 2013

Intended status: Standards Track Expires: May 2, 2008 Oct 30, 2007

Request for Comments: 7314 Category: Experimental July 2014 ISSN: Extension Mechanisms for DNS (EDNS) EXPIRE Option.

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: February 2016

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Ericsson March 2017

Network Working Group. Intended status: Standards Track March 2, 2018 Expires: September 3, 2018

Internet Engineering Task Force. Intended status: Standards Track. February 23, 2015

Internet Engineering Task Force (IETF) Updates: 6376 January 2018 Category: Standards Track ISSN:

Independent Submission Request for Comments: 6919 Category: Experimental. RTFM, Inc. 1 April 2013

Internet Engineering Task Force (IETF) Request for Comments: 7330 Category: Standards Track. Cisco Systems August 2014

Internet Engineering Task Force (IETF) Request for Comments: ISSN: June 2010

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Transport Area Working Group. Intended status: Standards Track. September 3, 2018

Network Working Group. Updates: 3515 (if approved) Intended status: Standards Track Expires: April 30, 2015 October 27, 2014

Internet Engineering Task Force (IETF) Request for Comments: ISSN: R. Gilman September 2013

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2018

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011

Internet Engineering Task Force (IETF) Request for Comments: 8336 Category: Standards Track. March 2018

Internet Engineering Task Force (IETF) Request for Comments: 6828 Category: Informational January 2013 ISSN:

Updates: 6126 May 2015 Category: Experimental ISSN: Extension Mechanism for the Babel Routing Protocol

Category: Informational January 2010 ISSN:

Network Working Group Request for Comments: 5576 Category: Standards Track Helsinki University of Technology T. Schierl Fraunhofer HHI June 2009

Intended status: Standards Track Expires: August 28, 2008 Hitachi A. Kobayashi NEC Corp. M. Stiemerling (Ed.) NEC Europe Ltd.

M. Wang, Ed. Intended status: Informational Expires: January 4, China Mobile July 3, 2017

AVT Core Working Group. Intended status: Experimental Expires: September 15, 2011 Aalto University L. Eggert Nokia March 14, 2011

Internet Engineering Task Force (IETF) Request for Comments: 7004 Category: Standards Track. Q. Wu, Ed. R. Huang Huawei September 2013

RTP model.txt 5/8/2011

Internet Engineering Task Force (IETF) Updates: 4326 June 2014 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Informational Bell Laboratories, Alcatel-Lucent S. Poretsky Allot Communications April 2015

Internet Engineering Task Force (IETF) Request for Comments: 6034 Category: Standards Track October 2010 ISSN:

Transcription:

SIPBRANDY Working Group Internet-Draft Intended status: Informational Expires: June 6, 2019 A. Johnston Villanova University B. Aboba Microsoft A. Hutton Atos R. Jesske Deutsche Telekom T. Stach Unaffiliated December 3, 2018 An Opportunistic Approach for Secure Real-time Transport Protocol (OSRTP) draft-ietf-sipbrandy-osrtp-07 Abstract Opportunistic Secure Real-time Transport Protocol (OSRTP) is an implementation of the Opportunistic Security mechanism, as defined in RFC 7435, applied to Real-time Transport Protocol (RTP). OSRTP allows encrypted media to be used in environments where support for encryption is not known in advance, and not required. OSRTP does not require SDP extensions or features and is fully backwards compatible with existing implementations using encrypted and authenticated media and implementations that do not encrypt or authenticate media packets. OSRTP is not specific to any key management technique for SRTP. OSRTP is a transitional approach useful for migrating existing deployments of real-time communications to a fully encrypted and authenticated state. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on June 6, 2019. Johnston, et al. Expires June 6, 2019 [Page 1]

Copyright Notice Copyright (c) 2018 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction........................ 2 1.1. Applicability Statement................. 3 2. Requirements Language.................... 3 3. SDP Offer/Answer Considerations............... 3 3.1. Generating the Initial OSRTP Offer........... 4 3.2. Generating the Answer.................. 4 3.3. Offerer Processing the Answer.............. 4 3.4. Modifying the Session.................. 4 4. Security Considerations................... 5 5. IANA Considerations..................... 5 6. Implementation Status.................... 5 7. Acknowledgements...................... 6 8. References......................... 6 8.1. Normative References.................. 6 8.2. Informative References................. 7 Authors Addresses....................... 8 1. Introduction Opportunistic Security [RFC7435] (OS) is an approach to security that defines a third mode for security between "cleartext" and "comprehensive protection" that allows encryption and authentication to be used if supported but will not result in failures if it is not supported. In terms of secure media, cleartext is RTP [RFC3550] media which is negotiated with the RTP/AVP (Audio Video Profile) [RFC3551] or the RTP/AVPF profile [RFC4585]. Comprehensive protection is Secure RTP [RFC3711], negotiated with a secure profile, such as SAVP or SAVPF [RFC5124]. OSRTP allows SRTP to be negotiated with the RTP/AVP profile, with fallback to RTP if SRTP is not supported. Johnston, et al. Expires June 6, 2019 [Page 2]

There have been some extensions to SDP to allow profiles to be negotiated such as SDP Capabilities Negotiation (capneg) [RFC5939]. However, these approaches are complex and have very limited deployment in communication systems. Other key management protocols for SRTP have been developed which by design use OS, such as ZRTP [RFC6189]. This approach for OSRTP is based on [I-D.kaplan-mmusic-best-effort-srtp] where it was called "best effort SRTP". [I-D.kaplan-mmusic-best-effort-srtp] has a full discussion of the motivation and requirements for opportunistic secure media. OSRTP uses the presence of SRTP keying-related attributes in an SDP offer to indicate support for opportunistic secure media. The presence of SRTP keying-related attributes in the SDP answer indicates that the other party also supports OSRTP and encrypted and authenticated media will be used. OSRTP requires no additional extensions to SDP or new attributes and is defined independently of the key agreement mechanism used. OSRTP is only usable when media is negotiated using the Offer/Answer protocol [RFC3264]. 1.1. Applicability Statement OSRTP is a transitional approach that provides a migration path from unencrypted communication (RTP) to fully encrypted communication (SRTP). It is only to be used in existing deployments which are attempting to transition to fully secure communications. New applications and new deployments will not use OSRTP. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 3. SDP Offer/Answer Considerations This section defines the SDP offer/answer considerations for opportunistic security. The procedures are for a specific m- section describing RTP-based media. If an SDP offer or answer contains multiple such m- sections, the procedures are applied to each m- section individually. "Initial OSRTP offer" refers to the offer in which oportunistic security is offered for an m- section for the first time within an SDP session. Johnston, et al. Expires June 6, 2019 [Page 3]

It is important to note that OSRTP makes no changes, and has no effect on media sessions in which the offer contains a secure profile of RTP, such as SAVP or SAVPF. As discussed in [RFC7435], this is the "comprehensive protection" for media mode. 3.1. Generating the Initial OSRTP Offer To indicate support for OSRTP in an SDP offer, the offerer uses the RTP/AVP profile [RFC3551] or the RTP/AVPF profile [RFC4585] but includes SRTP keying attributes. OSRTP is not specific to any key management technique for SRTP. For example: If the offerer supports DTLS-SRTP key agreement [RFC5763], then an a=fingerprint attribute will be present, or If the offerer supports SDP Security Descriptions key agreement [RFC4568], then an a=crypto attribute will be present, or If the offerer supports ZRTP key agreement [RFC6189], then an a=zrtp-hash attribute will be present. 3.2. Generating the Answer To accept OSRTP, an answerer receiving an offer indicating support for OSRTP generates an SDP answer containing SRTP keying attributes which match one of the keying methods in the offer. The answer MUST NOT contain attributes from more than one keying method, even if the offer contained multiple keying method attributes. The selected SRTP key management approach is followed and SRTP media is used for this session. If the SRTP key management fails for any reason, the media session MUST fail. To decline OSRTP, the answerer generates an SDP answer omitting SRTP keying attributes, and the media session proceeds with RTP with no encryption or authentication used. 3.3. Offerer Processing the Answer If the offerer of OSRTP receives an SDP answer which does not contain SRTP keying attributes, then the media session proceeds with RTP. If the SDP answer contains SRTP keying attributes then the associated SRTP key management approach is followed and SRTP media is used for this session. If the SRTP key management fails, the media session MUST fail. 3.4. Modifying the Session When an offerer generates a subsequent offer it should do so following the principles of [RFC6337] meaning that the decision to create an OSRTP type offer or something else should not be influenced Johnston, et al. Expires June 6, 2019 [Page 4]

by what was previously negotiated. For example if a previous OSRTP offer did not result in SRTP being established the offerer may try again and generate a new OSRTP offer as specified in section [3.1]. 4. Security Considerations The security considerations of [RFC7435] apply to OSRTP, as well as the security considerations of the particular SRTP key agreement approach used. However, the authentication requirements of a particular SRTP key agreement approach are relaxed when that key agreement is used with OSRTP. For example: For DTLS-SRTP key agreement [RFC5763], an authenticated signaling channel does not need to be used with OSRTP if it is not available. For SDP Security Descriptions key agreement [RFC4568], an authenticated signaling channel does not need to be used with OSRTP if it is not available, although an encrypted signaling channel must still be used. For ZRTP key agreement [RFC6189], the security considerations are unchanged, since ZRTP does not rely on the security of the signaling channel. As discussed in [RFC7435], OSRTP is used in cases where support for encryption by the other party is not known in advance, and not required. For cases where it is known that the other party supports SRTP or SRTP needs to be used, OSRTP MUST NOT be used. Instead, a secure profile of RTP is used in the offer. 5. IANA Considerations This document has no actions for IANA. 6. Implementation Status Note to RFC Editor: Please remove this entire section prior to publication, including the reference to [RFC6982]. This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in [RFC6982]. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was Johnston, et al. Expires June 6, 2019 [Page 5]

supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalog of available implementations or their features. Readers are advised to note that other implementations may exist. According to [RFC6982], "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit". There are implementations of [I-D.kaplan-mmusic-best-effort-srtp] in deployed products by Microsoft and Unify. The IMTC "Best Practices for SIP Security" document [IMTC-SIP] recommends this approach. The SIP Forum planned to include support in the SIPconnect 2.0 SIP trunking recommendation [SIPCONNECT]. There are many deployments of ZRTP [RFC6189]. 7. Acknowledgements This document is dedicated to our friend and colleague Francois Audet who is greatly missed in our community. His work on improving security in SIP and RTP provided the foundation for this work. Thanks to Eric Rescorla, Martin Thomson, Christer Holmberg, and Richard Barnes for their comments. 8. References 8.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC3264] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model with Session Description Protocol (SDP)", RFC 3264, DOI 10.17487/RFC3264, June 2002, <https://www.rfc-editor.org/info/rfc3264>. [RFC3550] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", STD 64, RFC 3550, DOI 10.17487/RFC3550, July 2003, <https://www.rfc-editor.org/info/rfc3550>. Johnston, et al. Expires June 6, 2019 [Page 6]

[RFC3551] Schulzrinne, H. and S. Casner, "RTP Profile for Audio and Video Conferences with Minimal Control", STD 65, RFC 3551, DOI 10.17487/RFC3551, July 2003, <https://www.rfc-editor.org/info/rfc3551>. [RFC3711] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K. Norrman, "The Secure Real-time Transport Protocol (SRTP)", RFC 3711, DOI 10.17487/RFC3711, March 2004, <https://www.rfc-editor.org/info/rfc3711>. [RFC4568] Andreasen, F., Baugher, M., and D. Wing, "Session Description Protocol (SDP) Security Descriptions for Media Streams", RFC 4568, DOI 10.17487/RFC4568, July 2006, <https://www.rfc-editor.org/info/rfc4568>. [RFC4585] Ott, J., Wenger, S., Sato, N., Burmeister, C., and J. Rey, "Extended RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/AVPF)", RFC 4585, DOI 10.17487/RFC4585, July 2006, <https://www.rfc-editor.org/info/rfc4585>. [RFC5124] Ott, J. and E. Carrara, "Extended Secure RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/SAVPF)", RFC 5124, DOI 10.17487/RFC5124, February 2008, <https://www.rfc-editor.org/info/rfc5124>. [RFC5763] Fischl, J., Tschofenig, H., and E. Rescorla, "Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS)", RFC 5763, DOI 10.17487/RFC5763, May 2010, <https://www.rfc-editor.org/info/rfc5763>. [RFC6189] Zimmermann, P., Johnston, A., Ed., and J. Callas, "ZRTP: Media Path Key Agreement for Unicast Secure RTP", RFC 6189, DOI 10.17487/RFC6189, April 2011, <https://www.rfc-editor.org/info/rfc6189>. [RFC7435] Dukhovni, V., "Opportunistic Security: Some Protection Most of the Time", RFC 7435, DOI 10.17487/RFC7435, December 2014, <https://www.rfc-editor.org/info/rfc7435>. 8.2. Informative References [I-D.kaplan-mmusic-best-effort-srtp] Audet, F. and H. Kaplan, "Session Description Protocol (SDP) Offer/Answer Negotiation For Best-Effort Secure Real-Time Transport Protocol", draft-kaplan-mmusic-besteffort-srtp-01 (work in progress), October 2006. Johnston, et al. Expires June 6, 2019 [Page 7]

[IMTC-SIP] "Best Practices for SIP Security", IMTC SIP Parity Group http://www.imtc.org/uc/sip-parity-activity-group/, 2011, <http://www.imtc.org>. [RFC5939] Andreasen, F., "Session Description Protocol (SDP) Capability Negotiation", RFC 5939, DOI 10.17487/RFC5939, September 2010, <https://www.rfc-editor.org/info/rfc5939>. [RFC6337] Okumura, S., Sawada, T., and P. Kyzivat, "Session Initiation Protocol (SIP) Usage of the Offer/Answer Model", RFC 6337, DOI 10.17487/RFC6337, August 2011, <https://www.rfc-editor.org/info/rfc6337>. [RFC6982] Sheffer, Y. and A. Farrel, "Improving Awareness of Running Code: The Implementation Status Section", RFC 6982, DOI 10.17487/RFC6982, July 2013, <https://www.rfc-editor.org/info/rfc6982>. [SIPCONNECT] "SIP-PBX / Service Provider Interoperability SIPconnect 2.0 - Technical Recommendation", SIP Forum http://www.sipf orum.org/component/option,com_docman/task,doc_download/ gid,838/itemid,261/, 2017, <http://www.sipforum.org>. Authors Addresses Alan Johnston Villanova University Villanova, PA USA Email: alan.b.johnston@gmail.com Bernard Aboba Microsoft One Microsoft Way Redmond, WA 98052 USA Email: bernard.aboba@gmail.com Johnston, et al. Expires June 6, 2019 [Page 8]

Andrew Hutton Atos Mid City Place London WC1V 6EA UK Email: andrew.hutton@atos.net Roland Jesske Deutsche Telekom Heinrich-Hertz-Strasse 3-7 Darmstadt 64295 Germany Email: R.Jesske@telekom.de Thomas Stach Unaffiliated Email: thomass.stach@gmail.com Johnston, et al. Expires June 6, 2019 [Page 9]