Re: [Detnet] consolidated response: IP Data Plane draft comments

"Black, David" <David.Black@dell.com> Thu, 10 October 2019 15:13 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B10C120026 for <detnet@ietfa.amsl.com>; Thu, 10 Oct 2019 08:13:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com header.b=Bhrwuq+v; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=kDfPaFnW
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3viKot9a5T7n for <detnet@ietfa.amsl.com>; Thu, 10 Oct 2019 08:13:23 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D771612001A for <detnet@ietf.org>; Thu, 10 Oct 2019 08:13:23 -0700 (PDT)
Received: from pps.filterd (m0170390.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x9AF9wtv013697; Thu, 10 Oct 2019 11:13:22 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=9fvwGPQSaYLw5iLpM87eLDO8lazhx9MthNd5EypDSN0=; b=Bhrwuq+v1VLlDI6KFfe7tIlLK0xHPKfPKZoIHdiU2085M8/SXvTzI3rvQyHRrDWZM0w3 EULDwzqszyV4KzeuZHjNYNBJ497AR6xoUE4oKUBrwmBOdN7HXkRk0rONpp6l7DEyzzcR 0GkZ13TSip8/1VXIthX9fIMsk2N78QyQgUiZLGCqTFnVMGQJDx+z5ygYPb2dIXZM8tqI 9pOOVxL2Pqn4BmFDLstDIX4bE7tMjE77PtsXOQJrHJllhvfAa4qND1CGTcHMrSnAbqz/ Zr91BWWF4rJF6BLYAO63vrEzrgqrCY8jWTE5PZygXZ5Grlq4BwGUALKo+foRDi3dJk/f rg==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0a-00154904.pphosted.com with ESMTP id 2vep85hgdc-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 10 Oct 2019 11:13:22 -0400
Received: from pps.filterd (m0133268.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x9AF82A9054406; Thu, 10 Oct 2019 11:13:22 -0400
Received: from mailuogwhop.emc.com (mailuogwhop-nat.lss.emc.com [168.159.213.141] (may be forged)) by mx0a-00154901.pphosted.com with ESMTP id 2vj54k2qb9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 10 Oct 2019 11:13:22 -0400
Received: from maildlpprd06.lss.emc.com (maildlpprd06.lss.emc.com [10.253.24.38]) by mailuogwprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id x9AFCVwB023729 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 10 Oct 2019 11:13:20 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com x9AFCVwB023729
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1570720400; bh=ngxbY1JaAdLvt9sd1xtc79Gxft4=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=kDfPaFnWAl2m+aHFgmsiD6J5xxVHLSlqR7YYPRe/b8/dPrulhy56z/VQ95zpcwM7q echkI0/evqaE9jJhNGzb5in+rh1Lt9oapreNBxxWjcIIR9Bk82rpR3aUuOCH8qW+kh KHXsFI381J5YJBJO7YYow2TMRwJJWpvhXl9EAO6k=
Received: from mailusrhubprd53.lss.emc.com (mailusrhubprd53.lss.emc.com [10.106.48.18]) by maildlpprd06.lss.emc.com (RSA Interceptor); Thu, 10 Oct 2019 11:10:46 -0400
Received: from MXHUB309.corp.emc.com (MXHUB309.corp.emc.com [10.146.3.35]) by mailusrhubprd53.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id x9AFAjMo018492 (version=TLSv1.2 cipher=AES128-SHA256 bits=128 verify=FAIL); Thu, 10 Oct 2019 11:10:46 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB309.corp.emc.com ([10.146.3.35]) with mapi id 14.03.0439.000; Thu, 10 Oct 2019 11:10:45 -0400
From: "Black, David" <David.Black@dell.com>
To: Lou Berger <lberger@labn.net>
CC: "detnet@ietf.org" <detnet@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [Detnet] consolidated response: IP Data Plane draft comments
Thread-Index: AQHVfIdGFR6Q0fFpNE+Nquh1hwjvc6dQw6YAgAKuzACAAIRa4A==
Date: Thu, 10 Oct 2019 15:10:44 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949363076BB70@MX307CL04.corp.emc.com>
References: <0b0f78a3-b0c2-06a3-1d1a-9205f612a13f@labn.net> <CE03DB3D7B45C245BCA0D2432779493630765393@MX307CL04.corp.emc.com> <27583e1a-e43b-1c30-251a-e655c88e541c@labn.net>
In-Reply-To: <27583e1a-e43b-1c30-251a-e655c88e541c@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2019-10-10T15:08:12.9210855Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual; aiplabel=External Public
x-originating-ip: [10.238.21.131]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd53.lss.emc.com
X-RSA-Classifications: public, GIS Solicitation
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-10-10_05:2019-10-10,2019-10-10 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 mlxlogscore=999 clxscore=1015 impostorscore=0 mlxscore=0 adultscore=0 spamscore=0 malwarescore=0 bulkscore=0 priorityscore=1501 suspectscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1910100142
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 priorityscore=1501 suspectscore=0 bulkscore=0 clxscore=1015 malwarescore=0 adultscore=0 mlxlogscore=999 mlxscore=0 lowpriorityscore=0 spamscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1910100142
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/YaPUi9uPftrxt6lPPCFlSVyuBqM>
Subject: Re: [Detnet] consolidated response: IP Data Plane draft comments
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Oct 2019 15:13:27 -0000

Lou,

> I think there's some cross usage of the term flow here.   DetNet flow
> identification is the traffic classification function that enables
> DetNet to deliver different service, including paths through a network
> to different flows.  ECN markings already impact how packets are handled
> in ECN enabled routers (DROP for 00 for DE packets).  

I'm drawing a bright-line distinction between different service in network nodes (both DSCP and ECN are used for this purpose) and selection of paths.

In other words, if "including paths through the network" were removed from the above text snippet, I would strongly agree.

> Also, I don't see
> anything in the RFCs that would preclude path selection based on
> different DSCPs or different ECN field values

I firmly disagree on those two:
DSCP:- Selection of different paths based on DSCP is problematic for network operations and management tools.
ECN: I believe that different path selection based on ECN values is effectively prohibited by RFC 3168, and is completely inconsistent with prior and ongoing Transport Area work.

To summarize what I think ought to be done:
- Path selection based on DSCP ought to be a "SHOULD NOT" requirement.  RFC 7657 is relevant to this.
- Path selection based on ECN has to be a "MUST NOT" requirement - see RFC 3168.

> As a possible example, I could see ECT and non-ect
> traffic routed over different paths and am not sure where this is
> precluded by the reference RFCs.

Please read RFC 3168 to better understand why that is a seriously bad idea.

> > Is it at least possible to prohibit (or at least
> > strongly discourage, i.e., "SHOULD NOT") use of the same 5-tuple for DetNet
> > and non-DetNet traffic?  That would at least contain the resulting network
> > management and operational effects to DetNet?
> 
> I'm not sure how we can preclude what operators choose to do.  Vendors
> on the other hand...

I'm not looking for "preclude" which would be expressed as "MUST NOT."  What I'm looking for is a strong "here be dragons" "SHOULD NOT" warning about mixing DetNet and non-DetNet traffic on the same 5-tuple (e.g., that sure looks like an opportunity to misdirect DetNet OAM traffic into non-DetNet paths and forwarding planes).  Then operators who choose to do otherwise have only themselves to credit for the consequences.

> > Also, be aware that if two DetNet flows differ only in DSCP, most existing
> > network transport protocols will have problems dealing with that situation
> > - see RFC 7657 for details.
> 
> sure.  but then it should be using different DSCP values.

I'm not sure what "it" refers to, but if that was meant to imply that existing network transport protocols are not or never appropriate for use with DetNet, then I would strongly disagree.

The rest of the context is that in end systems, DSCP is not used to choose the "socket" or equivalent - traffic is muxed/demuxed to/from transport protocol sessions/instances based on 5-tuple (not including DSCP) with DSCPs being used to label flows, but not to subdivide any 5-tuple flow into multiple 6-tuple sub-flows.   If splitting a 5-tuple flow into multiple sub-flows is what's wanted, then the WebRTC example ought to be followed where header info above the IP header (and above the UDP header) is used to do the mux/demux so that multiple WebRTC sub-flows can use the same 5-tuple.

Thanks, --David

> -----Original Message-----
> From: detnet <detnet-bounces@ietf.org> On Behalf Of Lou Berger
> Sent: Wednesday, October 9, 2019 10:42 PM
> To: Black, David
> Cc: detnet@ietf.org
> Subject: Re: [Detnet] consolidated response: IP Data Plane draft comments
> 
> 
> [EXTERNAL EMAIL]
> 
> Hi David,
> 
> Thanks for the response, see below.
> 
> 
> ----------
> On October 8, 2019 10:04:00 AM "Black, David" <David.Black@dell.com>
> wrote:
> 
> > Lou,
> >
> >> Please let me know if this addresses all your comments in an acceptable
> >> fashion or if you'd like to discuss further.
> >
> > The proposed text does not address the comments.
> >
> > [A] ECN
> >
> > The proposed text effectively ignores the comments, and fails to address
> > the problem.
> >
> > The ECN field MUST NOT be used for flow identification, period (e.g., see
> > RFC 3290, which does not include ECN in the 6-tuple).  In particular, it
> > would be wrong for two DetNet flows to differ solely on the values used in
> > the ECN field.  If there's a disagreement, please cite text from RFC 3168
> > that justifies this proposed ECN field usage.
> >
> 
> I think there's some cross usage of the term flow here.   DetNet flow
> identification is the traffic classification function that enables
> DetNet to deliver different service, including paths through a network
> to different flows.  ECN markings already impact how packets are handled
> in ECN enabled routers (DROP for 00 for DE packets).  Also, I don't see
> anything in the RFCs that would preclude path selection based on
> different DSCPs or different ECN field values -- It is even covered
> under 'split paths' albeit from the perspective of a broken
> implementation.  As a possible example, I could see ECT and non-ect
> traffic routed over different paths and am not sure where this is
> precluded by the reference RFCs.
> 
> 
> > [B] 5-tuples and 6-tuples
> >
> > As I noted in one of the referenced messages in response to a question:
> >
> >> > Are you okay with dropping "While 5-tuples suffice to identify DetNet
> flows,"
> >> Not by itself - if that text is dropped, I'd want to add a couple of sentences
> >> (perhaps not in Section 3) to explain how DetNet flows differ from
> Diffserv
> >> flows,
> >> i.e., "microflows" in defined in RFC 2475 (Diffserv Architecture).
> >
> > The heads up for everyone is that if multiple DetNet flows differ only in
> > DSCP (i.e., IP addresses, transport protocol and ports are the same), then
> > non-DetNet network management tools that deal with traffic flows will
> lump
> > those flows together.  Is it at least possible to prohibit (or at least
> > strongly discourage, i.e., "SHOULD NOT") use of the same 5-tuple for
> DetNet
> > and non-DetNet traffic?  That would at least contain the resulting network
> > management and operational effects to DetNet?
> 
> I'm not sure how we can preclude what operators choose to do.  Vendors
> on the other hand...
> 
> How about adding:
> 
> It is important to note that the DSCP values used within a DetNet domain
> may not be meaningful outside of that DetNet domain as the values may
> have no relationship to standard PHB and DSCP values.  It is REQUIRED
> that routers that operate in both DetNet and non-DetNet domains support
> remapping or setting the DSCP value of any flow originating in a DetNet
> domain.
> 
> 
> >
> > The use of DSCP for flow identification makes the OAM problem much
> harder
> > for the IP data plane by dramatically increasing the difficulty of getting
> > DetNet IP OAM traffic to fate-share with the DetNet traffic for which the
> > OAM functionality is intended (it may be necessary to resort to shoving an
> > MPLS label in there to identify OAM traffic and requiring nodes that
> > originate or terminate DetNet OAM packets to understand enough of
> MPLS to
> > deal with this).
> For the MPLS data plane, I suspect this will be required.  For IP, given
> the complexities of ECMP, I don't see how this behavior notably
> complicates OAM, but also agree it will need to be considered.
> 
> >
> > Also, be aware that if two DetNet flows differ only in DSCP, most existing
> > network transport protocols will have problems dealing with that situation
> > - see RFC 7657 for details.
> 
> sure.  but then it should be using different DSCP values.
> 
> Lou
> 
> PS WRT your offer to join one of the data plane calls, that would be great!
> 
> >
> > Thanks, --David
> >
> >> -----Original Message-----
> >> From: Lou Berger <lberger@labn.net>
> >> Sent: Sunday, October 6, 2019 4:47 PM
> >> To: Black, David
> >> Cc: detnet@ietf.org
> >> Subject: consolidated response: IP Data Plane draft comments
> >>
> >>
> >> [EXTERNAL EMAIL]
> >>
> >> David,
> >>
> >>      My apologies on the time to get back to this topic.  Before the
> >> last IETF you raised a number of points on the IP data plane document.
> >> For context, I believe the threads are found in:
> >>
> https://mailarchive.ietf.org/arch/msg/detnet/ykpI6gbH2L705BBjmHbnsZraxi
> g
> >>
> https://mailarchive.ietf.org/arch/msg/detnet/phi4OBWijlp7T4_HML2YvWfoa
> as
> >>
> https://mailarchive.ietf.org/arch/msg/detnet/th2Yj5Z4_8VtBsEOF1UfLejMh
> pM
> >> https://mailarchive.ietf.org/arch/msg/detnet/qvs-
> S0Nrm1B8w8JYO7zDLFwpTFQ
> >>
> >> In re reviewing the discussions, I think we missed the ECN field. Based
> >> on this and a general reread, I have put together a proposed set of
> >> changes to the published draft.  The changes are  available at
> >>
> >> https://github.com/detnet-wg/data-plane-
> >> drafts/commit/d3a733556804f11abbedbd128e3c62786418ddc8
> >>
> >> (text format can be received at
> >> https://xml2rfc.tools.ietf.org/cgi-
> >> bin/xml2rfc.cgi?url=https://raw.githubusercontent.com/detnet-wg/data-
> >> plane-drafts/working/lb/ip-tos-update/ip/draft-ietf-detnet-ip.xml)
> >>
> >> the following changes are proposed:
> >> OLD183,195c185,202
> >> <    The DetNet IP data plane uses "6-tuple" based flow identification,
> >> <    where 6-tuple refers to information carried in IP and higher layer
> >> <    protocol headers.  The 6-tuple referred to in this document is the
> >> <    same as that defined in [RFC3290].  Specifically 6-tuple is
> >> <    (destination address, source address, IP protocol, source port,
> >> <    destination port, and differentiated services (DiffServ) code point
> >> <    (DSCP).  General background on the use of IP headers, and 5-tuples,
> >> <    to identify flows and support Quality of Service (QoS) can be found
> >> <    in [RFC3670].  [RFC7657] also provides useful background on the
> >> <    delivery of DiffServ and "tuple" based flow identification.
> >> <    Referring to a 6-tuple allows DetNet nodes to forward packets with
> >> <    the 6-tuple as is or remap the DSCP where required by the DetNet
> >> <    service.
> >> NEW
> >>  >    The DetNet IP data plane primarily uses "6-tuple" based flow
> >>  >    identification, where 6-tuple refers to information carried in IP and
> >>  >    higher layer protocol headers.  The 6-tuple referred to in this
> >>  >    document is the same as that defined in [RFC3290]. Specifically
> >>  >    6-tuple is (destination address, source address, IP protocol, source
> >>  >    port, destination port, and differentiated services (DiffServ) code
> >>  >    point (DSCP).  General background on the use of IP headers, and
> >>  >    5-tuples, to identify flows and support Quality of Service (QoS) can
> >>  >    be found in [RFC3670].  [RFC7657] also provides useful background on
> >>  >    the delivery of DiffServ and "tuple" based flow identification.
> >>  >
> >>  >    The DetNet IP data plane also allows for optional matching on two
> >>  >    additional data fields.  The optional fields are the ECN Field, as in
> >>  >    [RFC3168], and the IPv6 flow label field, as defined in [RFC8200].
> >>  >
> >>  >    Generally the fields used in flow identification are forward
> >>  >    unmodified but modification is allowed, for example to a DSCP value,
> >>  >    when required by the DetNet service.
> >>
> >> OLD
> >> <    masks, prefixes and ranges.  IP tunnels may also be used to support
> >> NEW
> >>  >    masks, lists, prefixes and ranges.  IP tunnels may also be used to
> >>
> >> OLD
> >> 437,438c444,446
> >> <    of the 6-tuple i.e., the typical 5-tuple enhanced with the DSCP code,
> >> <    uniquely identifies a DetNet service flow.
> >> NEW
> >>  >    of the 6-tuple i.e., the typical 5-tuple enhanced with the DSCP and
> >>  >    previously mentioned two optional fields, uniquely identifies a
> >>  >    DetNet service flow.
> >>
> >> OLD
> >> 590,593c598,608
> >> <    MUST support bitmask based matching, where bits set to one (1) in
> the
> >> <    bitmask indicate which subset of the bits in the field are to be used
> >> <    in determining a match.  Note that all bits set to zero (0) value as
> >> <    a bitmask effectively means that these fields are ignored.
> >> NEW
> >>  >    MUST support list based matching of DSCP values, where the list is
> >>  >    composed of possible field values that are to be considered when
> >>  >    identifying a specific DetNet flow.  Implementations SHOULD allow for
> >>  >    this field to be ignored for a specific DetNet flow.
> >>  >
> >>  >    Implementations of this document MUST allow the ECN field to be
> >>  >    ignored as part of DetNet flow identification. Additionally,
> >>  >    implementations SHOULD support identification of DetNet flows
> based
> >>  >    on the value carried in the ECN field.  When this field is used to
> >>  >    identify a specific DetNet flow, implementations MUST support a list
> >>  >    of ECN values that match a specific slow.
> >>
> >> OLD
> >> 705c720,729
> >> <    o  IPv4 Type of Service and IPv6 Traffic Class Fields.
> >> <
> >> <    o  IPv4 Type of Service and IPv6 Traffic Class Field Bitmask, where a
> >> <       zero (0) effectively means that theses fields are ignored.
> >> NEW
> >>  >    o  For the IPv4 Type of Service and IPv6 Traffic Class Fields:
> >>  >
> >>  >       *  If the DSCP field is to be used in flow identification.
> >>  >          Ignoring the DSCP filed is optional.
> >>  >
> >>  >       *  When the DSCP field is used in flow identification, a list of
> >>  >          field values that may be used by a specific flow.
> >>  >
> >>  >       *  If the ECN field is to be used in flow identification.
> >>  >          Matching based on ECN filed values is optional.
> >>  >
> >>  >       *  When ECN field is used in flow identification, a list of field
> >>  >          values that may be used by a specific flow.
> >>
> >> Please let me know if this addresses all your comments in an acceptable
> >> fashion or if you'd like to discuss further.
> >>
> >> (BTW I think this is the sole open set of issues on the document.)
> >>
> >> Thank you!
> >>
> >> Lou
> >>
> >
> > _______________________________________________
> > detnet mailing list
> > detnet@ietf.org
> > https://www.ietf.org/mailman/listinfo/detnet
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet