[Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

"Karstens, Nate" <Nate.Karstens@garmin.com> Thu, 05 March 2026 19:21 UTC

Return-Path: <prvs=85249570b2=nate.karstens@garmin.com>
X-Original-To: int-area@mail2.ietf.org
Delivered-To: int-area@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 8FF73C522032; Thu, 5 Mar 2026 11:21:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.783
X-Spam-Level:
X-Spam-Status: No, score=-2.783 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=garmin.com header.b="uSe9CBt4"; dkim=fail (2048-bit key) reason="fail (body has been altered)" header.d=garmin.com header.b="I5PUz/26"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Ra01HFjPrUq; Thu, 5 Mar 2026 11:21:15 -0800 (PST)
Received: from mx0b-000eb902.pphosted.com (mx0b-000eb902.pphosted.com [205.220.177.212]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E013DC522027; Thu, 5 Mar 2026 11:21:14 -0800 (PST)
Received: from pps.filterd (m0220299.ppops.net [127.0.0.1]) by mx0a-000eb902.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 625IvKYL2445799; Thu, 5 Mar 2026 13:21:04 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=garmin.com; h= content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pps1; bh=tTAyhpegUlRmWQYvEvLlm61776gVg od4d5fSvG5WArA=; b=uSe9CBt44DwwnoUXoMidMzjgsW9Yx76teCy625S02zbln azx20RwdV70dPLDoebo3xuCXhmc/38ReNx2HSzA0lxf0EoXh+eY1s1R/HiSA24o+ 0ni6pHuxnv97RGqjH0zNsLMrcC23JRiKeH42fT6+355x6VtUxyYLJdEZ82hJ7tpD ysRQ8gmeJZcHdMBwRJSQKvEj/bKFPM9VHTQ6wnv0q13z4alIsx243gIFeaigVfcT RzHqRYE9QdPZwmBOYh7HZ05jL43xg+TvtIFcSO7iNoZ7gFsPNw6WJKu2O8z/Anrx pPBj+Fzfse0pZyLLyAF5Z/4TEAGAbVsP812Oma+wg==
Received: from sj2pr03cu001.outbound.protection.outlook.com (mail-westusazon11022116.outbound.protection.outlook.com [52.101.43.116]) by mx0a-000eb902.pphosted.com (PPS) with ESMTPS id 4cqfj8r1gr-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Thu, 05 Mar 2026 13:21:03 -0600 (CST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Nw9vdNzS4zqpLObtfrSLYS2N6xpciBFsih0bUI747QOglzdaB4XJUU+8SawGeTYACySSoybsjVB6SV1WBc+HwWP5i2XfQpCleNzYs+6Jeg63zAb99LKCe6wJLZc04sVaXO/qD2anyAibfFUy0+HCyCxxatrxdhPpcBGzeQEDaD/kWX2UfR7vR19F779Xzn6lsYpzLRv5evcUL/hNA7Khj+apqYK+jy1HceF7HPYLg8kx6LD/DB6wALh1OuaHvWdXi2yn01SY+DlI4mGRDEI5bIvu5u9Lsz+xL5VE6Pdfv0UfyD6hkFXXM6THUq/zuCRXwErTrXVlt0ILvD9mvNLfjg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2Xn8ueFMSHTa4My22+ZKfMAx6tZS4z+mseo5vJEghYA=; b=YrtIXyRDBa3uQH/N9zf7BvSCMBvos7bJYWYVUZxGb4mjE7w2a7546Tcjy/oE64rxTAVZU1pgqwrQOzbLKOOxmKwrUopuG7QZFtbj8GmHnX6gzsZQ2Tbg7ZZ2L58PG05yL6nhH6nkGIizyhXoDv9S+x08Qoe2GA57Pu+RUgTz3RWjH1tbl+W1Oia3muU7GP0QMhgvgJ798/nVZf583+aBc7jnO676QXFICn5EXNg1y0e2C7JX28turNBRq/A2Hj9lKm1EC1mFeqFfh2EEvL0fn/ot8UavsU2Y3wQq+HUbRGI/7zcWCxT21QHp8Um5nKeYd+NG05yM0tpBQHrhk0/bzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=garmin.com; dmarc=pass action=none header.from=garmin.com; dkim=pass header.d=garmin.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=garmin.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2Xn8ueFMSHTa4My22+ZKfMAx6tZS4z+mseo5vJEghYA=; b=I5PUz/26prDuRvLKg/oRavgp4PRLG3ZvnSdWi2KoJXXHqQnvWdFWoblW7srNpSbEB43kmVJ3IXE9JjUqKMbPuXGB9SRQwsAOm1XSZ3KAOjCwjXbIcbFsldxyccwWeULdOZZJ09jwUjc9Qai/VwbgqASblK6z+ndVZQ/aJGFhbzSVPSaAU2hDTFVDImR+4fguaIMD/kzR525A7M1Db6Qr9aw9osYGzIaVyAstr4KrFmavvSwU1UKw6lhdWTu5OgdLVy4zz7UMdCCixyLM8/NGN76HVLbjt28bofv+3GfTSFxWT3k+QJNmUITJ0WsrqO/tv9uIFT/YD2SZSlFsVTXEQA==
Received: from CH3PR04MB8794.namprd04.prod.outlook.com (2603:10b6:610:167::22) by MN2PR04MB7133.namprd04.prod.outlook.com (2603:10b6:208:1f0::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9678.18; Thu, 5 Mar 2026 19:21:01 +0000
Received: from CH3PR04MB8794.namprd04.prod.outlook.com ([fe80::10fb:7f24:63aa:cd58]) by CH3PR04MB8794.namprd04.prod.outlook.com ([fe80::10fb:7f24:63aa:cd58%5]) with mapi id 15.20.9678.017; Thu, 5 Mar 2026 19:21:01 +0000
From: "Karstens, Nate" <Nate.Karstens@garmin.com>
To: Dave Thaler <dthaler1968=40googlemail.com@dmarc.ietf.org>, 'Dave Thaler' <dthaler1968@googlemail.com>, 'Wassim Haddad' <Wassim.Haddad@ericsson.com>, "draft-ietf-intarea-multicast-application-port@ietf.org" <draft-ietf-intarea-multicast-application-port@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>, "intarea-chairs@ietf.org" <intarea-chairs@ietf.org>
Thread-Topic: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)
Thread-Index: AQHcjvnqocXwIio72EKleCfsorBbuLVny+SggBrQRkCACChjAIAHMaOwgABVUoCADkCPsA==
Date: Thu, 05 Mar 2026 19:21:01 +0000
Message-ID: <CH3PR04MB8794BF42BDE88CF5BEB238A39C7DA@CH3PR04MB8794.namprd04.prod.outlook.com>
References: <176944768012.888289.12715916451163767700@dt-datatracker-77f8b84995-z4hzn> <051201dc8ef9$d77e6ce0$867b46a0$@gmail.com> <CH3PR04MB879454314C1D52F908F8A3D99C9EA@CH3PR04MB8794.namprd04.prod.outlook.com> <CH3PR04MB87941B9511D2029AF12FF6A69C6EA@CH3PR04MB8794.namprd04.prod.outlook.com> <148801dca1f1$41286970$c3793c50$@gmail.com> <CH3PR04MB8794DCE9F1BDA9DB4AE679059C74A@CH3PR04MB8794.namprd04.prod.outlook.com> <075c01dca5b4$bc3357d0$349a0770$@gmail.com>
In-Reply-To: <075c01dca5b4$bc3357d0$349a0770$@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_ActionId=7cd1e9c5-d20d-494f-86c6-e277ac31ea9f;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_ContentBits=0;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_Enabled=true;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_Method=Standard;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_Name=f3ff6d80-3782-4df6-bf6c-659f84558040;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_SetDate=2026-03-05T19:19:38Z;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_SiteId=38d0d425-ba52-4c0a-a03e-2a65c8e82e2d;MSIP_Label_f3ff6d80-3782-4df6-bf6c-659f84558040_Tag=10, 3, 0, 1;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH3PR04MB8794:EE_|MN2PR04MB7133:EE_
x-ms-office365-filtering-correlation-id: fc03903b-d421-4e5c-8b21-08de7aec564f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|4022899009|376014|7053199007|38070700021|13003099007|8096899003;
x-microsoft-antispam-message-info: oTk2hb+b0hWjZ1gfFtfU2FQd/6K6BGGIWhlCgd6MiqINcaZSFmK9SfbGPNSWxLUy6xJh+3Z/gFN077lqyVBtc0ik9U2TplR/mYKvSLpYeUwl9aONL6zzdq29QlW4bnzdBaqFGm4RXUnm+NcXH3U7RPnQCZBbLcHHWsSEry7DGodbPozY2VwOMwDpblkby264cndwQnZXimmaaqSZ2vG2/gZG86XRccbgQ/Cgu4uJUGiCau4WujCVeu3KSayOUWL2VS4oFLdgv/Ycyo4NqXl6io6XlK84q1mPeKZ2U6BuDV5BcwmPa9+RMkLN3hRwI326CHaWTDKsHyYV79TPivAViQ43EbWboogOteekqv2VdzheDRaX7bCw5WxuIUoFQ5u29bKUWzKjRTCWrZOn6MimqB6Iqaluyr5nnDqosRBPa1EOYTqECvjh+j8EN2GhXCYoP66ZdaHUc2CXNpwmYq30E8O1NBt2zQ4AGec0WIGow7htvvHXI/uzU85tFavo5/TwktSaWnOmYvB+kHpHRY82xhXu65GVjmPxbK2OwaajTELMGTfjqwPfGbxI6j94YUc/Nbt8UpguEpzE/qxXwM9cgxwTUn1UeJUIxHVXEPPTWLyQfaSC2DE3jAbAUTCj60cvNV3NLk6whLpCU87tJKjZIcGa/rkKMxd59+Ip5XSDHrOYx0TCJEEPW1cDj4a44wwhd2kcdfJp2ZLyycCQVoQOcBLQEFUv6FQHTwTRCE8LK2PSdwQIF3RDlaZPfuDYzNWJoABTHGC0vD/ekPfntpb7jxcdtqzPQqXKx1VfYDjwDs4=
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH3PR04MB8794.namprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(4022899009)(376014)(7053199007)(38070700021)(13003099007)(8096899003);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: srrKB2vmutlI/RDMojFWqxQzrIa3VOLruDy+q/Lw5xv4Ss+rH7emNEdWXTsWc3muMWYc4kAKRe5loqSzlMewT0FWyjv1jiJsMQbbr9ZivXsfBv1A1rlvZmh51hK4+mMXsst+4YWTpfi1s6VHcExqEnbg47bYeJ5BKM9X2t+bJ/fQ/1bq4wabndjUD/4U/29P5cuA0rv/zpcC9dAKFtpH3zTdDH93U9hL7Yb3XLPduU7u3XMaOfZZYtf9d8g9qfiepS3U6rQNATkIXw0/zBN/8ZMGnfs2DeT6ctNorEcpEi8ZweCBwaKOvSMqKfS4m4L4HGnrHe/AwJ0He+D9YhUrg/dvjUmU6ejr3qUGsHFDwlKVws30qTmPTpcXFcIZXY/DS0sfKP+6W++PIGVlwWQuJJsvjD4Pai9ymqMu/Kp7445lfpFBddku45vbTs/s+aRa06PJQlgQSs9UtrFO+abuH0FXFr+ZBik+RldtRmQxQwlMB+QRu1ColSEBoDiHPLKyTAlHA8fZkLrEwbbYqsd07g8HmRP00aBZxPY05yNUpGtIa/DJijEL5MXjHsugByT3ZEf5V8/ZoAcD10VprF9kh+lw7nXLJcrP8H0sPkscGDmRQZGNKVe3/KGDfz4hnLD1TFhdSLYqfSww42nbCsbaPM37Yowk1faGig4EInTTgDiOsbuQe0rq/fClIGJBBApdTJxlgAovW0qGVJgGH9axdZ51vU1sBtF+d5UaDA3jjYurqp8sZMHgGKvt9nt/c9eAmHDfz/z/GDQk0N44+UG8+Pc2EIZmvmCMblMqZjoq24KkBQC13RiTL6ZN1f86Rou6FdpWrjtxLsVJVuBWYiomMOBgeRCVHn210A8ctemCKggYKOKQzuOLloF34txdJyDZXpSc5MUvK+t+mbUsPjjws080+rShCggHfZACq1+6WPW/uLjWaYO0CiVaEXSXY3dF5QY+nFTaE0KfEzrK1iWmlr3qc3mVi2xALUX11O6ojMvi7dHRW8U3J7o+sXq2iB0xP11yhLizK0rrpa5b9wRimpSQi5Jqr6e/TdANEPoTbQLAaJ9axNH2CWPY81R3O7fpQIef2pwygl3YvgkrxNsulWaKZsrwcPWycHyr2YsfHh2F+PN4lIa8/K6F42GaWaiE5KYB7AHPq6VpqMPvYNm6kUeWvFz4k/4SbgVTb0Ll4aXxThlgieJ6fT5UZkTrtLK/FQqXPMg26keNt9wfzw+tDhBUbso42NiWe3dxP0+G/UOdjl36ADyz2QgSKqS+hNDn77rMjPRiniP7Y2KMdMGeCVx7G+HgUVl9pVW012n3Du4BwWAUacoktwvvSC00sV9jGgvcpRnfRpd4fyUDLdbx6EjklTHEmKHszrpjUNmM1YokMp+X0mYesYIwCAbIxjxpZdSGqmo2YXyACrnu2aSraM9MCbgjcukG2T21fiOz26pGnePfFy6AU1703cwi0sGLkebylhVrt+wk16M2EprBtEWMV0/KWtHd+GvY8OYem0xea57x9zjsrku5efl3wtCxy2YXgsrTBGBYgCKIV0x0Df40wBV6gbIWx9gnsN0WMGcozDKRcGWFjRXE001nGKfGFZPwDPAgIQZnBMUW+K/TsHIEdlvcRm14eS+KNpEIKV/OcKwoxjO8kei+JQu8GWr9txSgk4GGA3Xm8cM74PSMAbbs3ypeZSveYGy6FkpB6h5y26j7SWtShMuwnnlaNfgkiBQVWXDZKGq7VSrMBl8Usw==
Content-Type: multipart/alternative; boundary="_000_CH3PR04MB8794BF42BDE88CF5BEB238A39C7DACH3PR04MB8794namp_"
MIME-Version: 1.0
X-Exchange-RoutingPolicyChecked: VzvGa5MDDEDLiELk3T5BTQ9w3dTd26fbA60ZzS1meqQRfaoOVrAq3GunkaSNGDakh+bplgub8VSpoQI7avlW4X3ZorWsLBB+BDSx6GgtAjLXGlv4AAgS9NZJAOt6W2oO1x8v1CMp1C2mqEvTpg3TPm27hU9qWlAt+V0340ONryNCQIRVAYqIBKf1O2Z1ZCuQE2mYo0BF1+FtpfeGkzUmT79hrjafsI6rZWNZeq7R7mXMk50aq+F0zOPzAgd8XPVqgSyqAOHgaJV3glibrO/xKsJeY2Ie40StBoiBIJ/uuXItOiKtXrUN8rymRAWAn+hHEoQEZiVb6lBJVcWOUltRwQ==
X-OriginatorOrg: garmin.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH3PR04MB8794.namprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fc03903b-d421-4e5c-8b21-08de7aec564f
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Mar 2026 19:21:01.1543 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38d0d425-ba52-4c0a-a03e-2a65c8e82e2d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CTZOzKtYDKOjtiVDz6oCy+hwFCqEkowLdD1sL1jzIkkqW5cH7Re0I/fxgMWTN/0lEdIGBsXg8qJrNvGHF2JGhw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB7133
X-Authority-Analysis: v=2.4 cv=Hol72kTS c=1 sm=1 tr=0 ts=69a9d7a0 cx=c_pps a=wZyaRvxRJvpHILYenbmWGA==:117 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=Yq5XynenixoA:10 a=qm69fr9Wx_0A:10 a=VkNPw1HP01LnGYTKEx00:22 a=mT958ORwFhrKhj1UMJhN:22 a=YfTmIFYy1-V6Nr2o1wUd:22 a=RpNjiQI2AAAA:8 a=NbHB2C0EAAAA:8 a=mK_AVkanAAAA:8 a=48vgC7mUAAAA:8 a=0FD05c-RAAAA:8 a=5fwgZmwvAAAA:8 a=SyYMxH9GAAAA:8 a=clnMktIQAAAA:8 a=-JFWqQHnAAAA:8 a=uherdBYGAAAA:8 a=U0LxYK4HULE2cLAvNtgA:9 a=lqcHg5cX4UMA:10 a=QEXdDO2ut3YA:10 a=yMhMjlubAAAA:8 a=SSmOFEACAAAA:8 a=DdiIktio2FBOioCPAvcA:9 a=qxb-8iC9CTphA7AM:21 a=gKO2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4AuCg-hUA:10 a=3gWm3jAn84ENXaBijsEo:22 a=l1rpMCqCXRGZwUSuRcM3:22 a=QW3TqkFJwCefnqxhyh2v:22 a=APrGDfby6B38_wi3fuKY:22
X-Proofpoint-ORIG-GUID: PIC1TiNUIbzoELme_n472A0Jw31qDBXq
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMzA1MDE2MSBTYWx0ZWRfXwUk35lCEbiY3 XUaKhn+4kAVOIB+xS4PoQsvO8QEYj3ooj9Nm1xdHK4EJnhp7XnzhTG8jbfzvWa/fnj2koatAWhX 9u5QeV/rxWZDTc3/cqCTcyqg5KYzuK208lCUC6LMJad7/NCfUYn/Ul7ZprJ+rskzKegk+HSjxs9 Ss+VxMOCmYE6INf1//phk5DvILCxZNKnBwfFUIj6B/ZK/e6EI4RdZCVd2ktJkVSL3LeSZxmGNgl VxGfA9dhWqo4/fwGSjWz+KNw8NBO56gLz1SetOn03eeHSRrVyAki/ebL1ryaHYKwzmy7LODR1oM JuMJraxyc3WOtAC4qW+qRi1eAiSMQbsdZdQbQJ/7UD2mDORceQV7aEdIEy92C91310a2B3qpXy+ NplOMNqdm/Z8j9kqhTFaqD3oM6sQWjsgNAchpl3H4CMd+yvxGYQtZ0ZdaVT630zS4D+NQUVFwbU U4xJ5FLFfdiD7MDrBaQ==
X-Proofpoint-GUID: PIC1TiNUIbzoELme_n472A0Jw31qDBXq
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-03-05_05,2026-03-04_01,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 bulkscore=0 spamscore=0 phishscore=0 clxscore=1015 priorityscore=1501 impostorscore=0 malwarescore=0 adultscore=0 suspectscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2602130000 definitions=main-2603050161
Message-ID-Hash: CMUTTYYCVVLIRLZCY2BCRX7VOINNEAN5
X-Message-ID-Hash: CMUTTYYCVVLIRLZCY2BCRX7VOINNEAN5
X-MailFrom: prvs=85249570b2=nate.karstens@garmin.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-int-area.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)
List-Id: IETF Internet Area WG Mailing List <int-area.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/jpz8KQ5MNkCNHx9BUH9fSZQnnpw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Owner: <mailto:int-area-owner@ietf.org>
List-Post: <mailto:int-area@ietf.org>
List-Subscribe: <mailto:int-area-join@ietf.org>
List-Unsubscribe: <mailto:int-area-leave@ietf.org>

Thanks, Dave! Let’s continue the conversation on that thread.

Nate

From: Dave Thaler <dthaler1968=40googlemail.com@dmarc.ietf.org>
Sent: Tuesday, February 24, 2026 11:41
To: Karstens, Nate <Nate.Karstens@garmin.com>; 'Dave Thaler' <dthaler1968@googlemail.com>; Karstens, Nate <Nate.Karstens@garmin.com>; 'Wassim Haddad' <Wassim.Haddad@ericsson.com>; draft-ietf-intarea-multicast-application-port@ietf.org; int-area@ietf.org; intarea-chairs@ietf.org
Subject: RE: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

I think Brian Haberman just explained the security regression the draft introduces. Thanks Brian! From: Karstens, Nate <Nate. Karstens@ garmin. com> Sent: Tuesday, February 24, 2026 5: 29 AM To: Dave Thaler <dthaler1968@ googlemail. com>;

I think Brian Haberman just explained the security regression the draft introduces.
Thanks Brian!


From: Karstens, Nate <Nate.Karstens@garmin.com<mailto:Nate.Karstens@garmin.com>>
Sent: Tuesday, February 24, 2026 5:29 AM
To: Dave Thaler <dthaler1968@googlemail.com<mailto:dthaler1968@googlemail.com>>; 'Karstens, Nate' <Nate.Karstens=40garmin.com@dmarc.ietf.org<mailto:Nate.Karstens=40garmin.com@dmarc.ietf.org>>; 'Wassim Haddad' <Wassim.Haddad@ericsson.com<mailto:Wassim.Haddad@ericsson.com>>; draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-chairs@ietf.org<mailto:intarea-chairs@ietf.org>
Subject: RE: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

Dave,

Welcome back! Replies below marked [Karstens].

Nate

From: Dave Thaler <dthaler1968@googlemail.com<mailto:dthaler1968@googlemail.com>>
Sent: Thursday, February 19, 2026 16:44
To: 'Karstens, Nate' <Nate.Karstens=40garmin.com@dmarc.ietf.org<mailto:Nate.Karstens=40garmin.com@dmarc.ietf.org>>; Karstens, Nate <Nate.Karstens@garmin.com<mailto:Nate.Karstens@garmin.com>>; 'Dave Thaler' <dthaler1968@googlemail.com<mailto:dthaler1968@googlemail.com>>; 'Wassim Haddad' <Wassim.Haddad@ericsson.com<mailto:Wassim.Haddad@ericsson.com>>; draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-chairs@ietf.org<mailto:intarea-chairs@ietf.org>
Subject: RE: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

Just got back from vacation so going through this now… 1) Contradiction in node requirements Draft -03 abstract was: Ø This document discusses the drawbacks of the current practice of assigning a UDP port to each multicast Ø application. Such

Just got back from vacation so going through this now…


1)        Contradiction in node requirements



Draft -03 abstract was:

  *   This document discusses the drawbacks of the current practice of assigning a UDP port to each multicast
  *   application.  Such assignments are redundant because the multicast address already uniquely identifies
  *   the data.  The document proposes assigning a UDP port specifically for use with multicast applications
  *   and lists requirements for using this port.  This method does not require modification to existing protocol
  *   stacks, though recommended updates to make the port easier to use are included.



You said:

Ø  This document discusses the drawbacks of the current practice of assigning a UDP port to each multicast

Ø  application.  Such assignments are redundant because the multicast address already uniquely identifies

Ø  the data.  The document proposes assigning a UDP port specifically for use with multicast applications

Ø  and lists requirements for using this port.

Ø  This approach provides immediate compatibility with existing protocol stacks, while also requiring

Ø  improvements to make the port easier to use.

Draft -04 instead has:

  *   This document discusses the drawbacks of the current practice of assigning a UDP port to each multicast
  *   application.  Such assignments are redundant because the multicast address already uniquely identifies
  *   the data.  The document proposes assigning a UDP port specifically for use with multicast applications
  *   and lists requirements for using this port.  This method does not require modification to existing protocol
  *   stacks, though recommended updates to make the port easier to use are included.
  *   This approach provides immediate compatibility with existing protocol stacks, while also requiring
  *   improvements to make the port easier to use.

The green and yellow sentences are contradictory in my reading (“recommended” per green, “requiring” per yellow),
so draft -04 is still problematic I think.

[Karstens] You’re right, I had meant to replace that last sentence with the new one. Thank you for catching that!


  1.  Host Firewall Considerations in section 3.1

Draft -04 says

  *   Host firewalls SHOULD be designed to allow this sequence of messages

However, I disagree with this SHOULD as it opens up new security issues (as discussed in RFC 7288)
in that it breaks the ability to have a stealth mode which is a core value proposition.  And the security
considerations section does not even discuss this new security regression.  (The new paragraph in
section 5 does not.)


Rather than saying we SHOULD have a security regression, I would like this SHOULD to be removed
and instead do what I originally suggested in this thread, i.e., say that applications that need a sequence
like that in 3.1 should continue to request their own port and not use the Multicast Application Port.

That's already consistent with section 1.



[Karstens]

I’m trying to understand, from a firewall/security perspective, why requesting a port for the application is more secure. For reference, here are the two sequences of messages:



1)        Current method (requesting a port):
a. (Multicast) Host A to group (source & dest port 9132, currently unassigned)
b. (Unicast) Host B to Host A (source & dest port 9132)
c. (Unicast) Host A to Host B (source & dest port 9132)

2)        From the document:
a.  (Multicast) Host A to group containing Host B (source port: 50000, dest port: 8738)

b.  (Unicast) Host B to Host A (source port: 60000, dest port: 50000)

c.  (Unicast) Host A to Host B (source port: 50000, dest port: 60000)



The second one does require the firewall to maintain more state.

[/Karstens]



3)        Reference to RFC 7288



Looks good, thanks.



[Karstens] Sure thing. If you have a specific section that you think best illustrates the point here please let me know and I can reference that.



4)        Application Requirements



Looks good, thanks.



5)        Security Considerations



The new paragraph is fine but does not address point 2 above.



[Karstens] I should be able to improve this once I understand the security concerns more.



Dave



From: Karstens, Nate <Nate.Karstens=40garmin.com@dmarc.ietf.org<mailto:Nate.Karstens=40garmin.com@dmarc.ietf.org>>
Sent: Saturday, February 14, 2026 10:11 AM
To: Karstens, Nate <Nate.Karstens@garmin.com<mailto:Nate.Karstens@garmin.com>>; Dave Thaler <dthaler1968@googlemail.com<mailto:dthaler1968@googlemail.com>>; 'Wassim Haddad' <Wassim.Haddad@ericsson.com<mailto:Wassim.Haddad@ericsson.com>>; draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-chairs@ietf.org<mailto:intarea-chairs@ietf.org>
Subject: RE: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

Dave,

We posted a new version to https://datatracker.ietf.org/doc/draft-ietf-intarea-multicast-application-port/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-ietf-intarea-multicast-application-port/__;!!EJc4YC3iFmQ!VvS-FLjHJBHjIAu9gi_sN5qEv_EvHhcknooZW2Qd-FVsozdQOCLBzSX4WdbPlANdK9mcV-HcAvvcveMvCITVuWgi5Oc$>, please let us know if that addresses your feedback.

Thanks!

Nate

From: Karstens, Nate <Nate.Karstens=40garmin.com@dmarc.ietf.org<mailto:Nate.Karstens=40garmin.com@dmarc.ietf.org>>
Sent: Thursday, January 29, 2026 13:00
To: Dave Thaler <dthaler1968=40googlemail.com@dmarc.ietf.org<mailto:dthaler1968=40googlemail.com@dmarc.ietf.org>>; 'Wassim Haddad' <Wassim.Haddad@ericsson.com<mailto:Wassim.Haddad@ericsson.com>>; draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-chairs@ietf.org<mailto:intarea-chairs@ietf.org>
Subject: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

Dave, Thanks for your feedback, this is really helpful! Please see the replies below… Cheers, Nate From: Dave Thaler <dthaler1968=40googlemail. com@ dmarc. ietf. org> Sent: Monday, January 26, 2026 1: 28 PM To: 'Wassim Haddad' <Wassim. Haddad@ ericsson. com>;

Dave,

Thanks for your feedback, this is really helpful!

Please see the replies below…

Cheers,

Nate

From: Dave Thaler <dthaler1968=40googlemail.com@dmarc.ietf.org<mailto:dthaler1968=40googlemail.com@dmarc.ietf.org>>
Sent: Monday, January 26, 2026 1:28 PM
To: 'Wassim Haddad' <Wassim.Haddad@ericsson.com<mailto:Wassim.Haddad@ericsson.com>>; draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-chairs@ietf.org<mailto:intarea-chairs@ietf.org>
Subject: [Int-area] Re: WG Last Call: draft-ietf-intarea-multicast-application-port-03 (Ends 2026-02-09)

1) Contradiction in node requirements Abstract says: > This method does not require > modification to existing protocol stacks, though recommended updates > to make the port easier to use are included. The above language ("recommended",


1) Contradiction in node requirements



Abstract says:

> This method does not require

> modification to existing protocol stacks, though recommended updates

> to make the port easier to use are included.



The above language ("recommended", "does not require") implies a SHOULD.

However, section 3 contradicts that and instead says:

> Hosts SHALL require applications using this port to use it non-

> exclusively.

(plus various other SHALL statements about hosts).



This especially matters if BCP 220 is updated to reference this document.



[Karstens] I can see how this would seem contradictory. This is a bit of a grey area because we would want someone looking at this document to interpret these as requirements, but that the advantage to this overall approach is that it can be used even in environments that have not been updated yet. I would propose changing the last sentence of the abstract as follows (full text included for context):



This document discusses the drawbacks of the current practice of assigning a UDP port to each multicast application.  Such assignments are redundant because the multicast address already uniquely identifies the data.  The document proposes assigning a UDP port specifically for use with multicast applications and lists requirements for using this port.  This approach provides immediate compatibility with existing protocol stacks, while also requiring improvements to make the port easier to use.



2) Assumption that implementers can configure host firewalls



Section 3.1 says:

> Implementers should be

> aware of this possibility and configure the host firewall

> appropriately.



In reality, there are various host firewall vendors (McAfee, Kaspersky, Norton,

etc.)  One cannot simply assume that the implementer of an arbitrary application

can write code to configure all host firewalls that might be installed on the machine

that an end-user or admin will install the application on.



[Karstens] The document’s use of “implementer” here is poor terminology. Using RFC 7288 terminology, this configuration could be the responsibility of the app developer, network admin, or host admin.



There’s also a type of firewall rule that we touched on earlier in the conversation and seems to play a significant role in modern host firewalls, which are rules based on the application instead of traffic patterns.



It appears that many host firewalls try to make configuring application rules as easy as possible by prompting the user in real time via a pop-up dialog. Some examples:



·       Windows Defender Firewall has the “Windows Security Alert” dialog that informs the user that “Windows Defender Firewall has blocked some features of this app” and allows the user to configure access.

·       Norton Smart Firewall includes Program Rules and notifies the user with a firewall alert when a program attempts to access the network (see https://support.norton.com/sp/en/us/home/current/solutions/v20240108181430529<https://urldefense.com/v3/__https:/support.norton.com/sp/en/us/home/current/solutions/v20240108181430529__;!!EJc4YC3iFmQ!QZVkT1k6bj2x7ZS41wQws16fe2o5Hfee0OvBXYIesO_hzaAmFx-M4NiIkWuCoXjVYpCdXKTkVHgdO8_i6SpXBWzcWHD7hynJUQ$>)

·       McAfee’s Advanced Firewall appears to work with Windows Defender Firewall and blocks outgoing connections (see https://www.mcafee.com/support/s/article/000002150?language=en_US<https://urldefense.com/v3/__https:/www.mcafee.com/support/s/article/000002150?language=en_US__;!!EJc4YC3iFmQ!QZVkT1k6bj2x7ZS41wQws16fe2o5Hfee0OvBXYIesO_hzaAmFx-M4NiIkWuCoXjVYpCdXKTkVHgdO8_i6SpXBWzcWHB-IEtWlw$>)

·       ZoneAlarm has Application Control alerts (see https://support.zonealarm.com/hc/en-us/articles/360060709831-Managing-Basic-Application-Control-Settings<https://urldefense.com/v3/__https:/support.zonealarm.com/hc/en-us/articles/360060709831-Managing-Basic-Application-Control-Settings__;!!EJc4YC3iFmQ!QZVkT1k6bj2x7ZS41wQws16fe2o5Hfee0OvBXYIesO_hzaAmFx-M4NiIkWuCoXjVYpCdXKTkVHgdO8_i6SpXBWzcWHBGm1PSnA$>)

·       Comodo Internet Security has Security Alerts (see https://help.comodo.com/topic-72-1-451-4706-.html<https://urldefense.com/v3/__https:/help.comodo.com/topic-72-1-451-4706-.html__;!!EJc4YC3iFmQ!QZVkT1k6bj2x7ZS41wQws16fe2o5Hfee0OvBXYIesO_hzaAmFx-M4NiIkWuCoXjVYpCdXKTkVHgdO8_i6SpXBWzcWHAsNe9kJA$>)



Section 1 does have an out:

> Use of this port is optional because there may be circumstances where

> assigning a port is preferred, such as when participants cannot meet

> the requirements in Section 3 and Section 4.



I think section 3.1 should instead say that in general, applications that

need a pattern like the one in 3.1 should continue to request their own

port and not use the Multicast Application Port.   That's already consistent

with section 1, and avoids implying something that ignores reality.



If we add port numbers to the exchange in section 3.1 (using “50000” and “60000” as a stand-in for a dynamic port), then we get the following:



1.       (Multicast) Host A to group containing Host B
S: 50000
D: 8738

2.       (Unicast) Host B to Host A
S: 60000
D: 50000

3.       (Unicast) Host A to Host B
S: 50000
D: 60000



It seems like a firewall rule could be written to characterize this traffic pattern:



1.       Host A observes multicast using D=8738 and for an approved multicast address. It notes source port 50000 and looks for replies using that port.

2.       Host A receives Message 2 and notes that its destination is 50000, the port recorded in Message 1. It allows the traffic through and notes source port 60000.

3.       Host A observes unicast using the source port recorded in Message 1 and the destination port recorded in Message 2.



In the absence of such a rule, or the ability of the host firewall to allow traffic for a given application (per the user configuration described above), then I would agree that requesting a port is the only alternative.



3) Reference to RFC 7288



I'll also repeat my earlier recommendation to add an informative reference

to RFC 7288 in the text on host firewall considerations.  For example...



OLD:    Certain host firewalls are designed to accept incoming messages as

OLD:    long as there was first an outgoing message using the same set of

OLD:    ports.  Consider the following sequence of messages:



NEW:   Certain host firewalls are designed to accept incoming messages as

NEW:   long as there was first an outgoing message using the same set of

NEW:   ports.  (See [RFC7288] for more discussion.) Consider the following sequence of messages:



[Karstens] Adding the reference here is fine with me. Can we narrow it down to a specific section of RFC 7288?



4) Application Requirements



Section 4 says:



>    Applications running on a non-conformant host SHALL discard all

>   datagrams that do not have the multicast address used by the

>   application.



Above is too broadly stated.  In think you specifically mean datagrams

received on the Multicast Application Port.  As worded, it says that the

application cannot have other sockets listening on other ports and accept

packets on them.



[Karstens] Good catch, I will fix this.



5) Security Considerations



There's another security consideration missing.   Applications that don't

use the Multicast Application Port can often rely on host firewall behavior

(which may be the default on host platforms the application is installable on)

to prevent unsolicited inbound traffic and hence help mitigate some classes

of attack.



By using the Multicast Application Port, that external protection no longer exists,

so the application must be prepared to deal with any resulting security

concerns itself.  That includes address/port scans, and attacks against

the application itself.   (Again see RFC 7288.)



The above needs to be called out in the Security Considerations section.



[Karstens] I think this problem is shared with the existing port system as well. The only difference is that making a rule to allow incoming traffic to the Multicast Application Port would allow all applications using the port. If we recommend that firewall rules referencing the Multicast Application Port also consider the multicast address, then we’d get the same protection offered by other rules that just reference the port.



Dave



> -----Original Message-----

> From: Wassim Haddad via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>>

> Sent: Monday, January 26, 2026 9:15 AM

> To: draft-ietf-intarea-multicast-application-port@ietf.org<mailto:draft-ietf-intarea-multicast-application-port@ietf.org>; int-area@ietf.org<mailto:int-area@ietf.org>; intarea-

> chairs@ietf.org<mailto:chairs@ietf.org>

> Subject: [Int-area] WG Last Call: draft-ietf-intarea-multicast-application-port-03

> (Ends 2026-02-09)

>

> Dear colleagues,

>

> This message starts a WG Last Call for:

> draft-ietf-intarea-multicast-application-port-03

>

> This Working Group Last Call ends on 2026-02-09

>

> Please note we need at least 5 reviews to progress the draft to next step.

>

> Abstract:

>    This document discusses the drawbacks of the current practice of

>    assigning a UDP port to each multicast application.  Such assignments

>    are redundant because the multicast address already uniquely

>    identifies the data.  The document proposes assigning a UDP port

>    specifically for use with multicast applications and lists

>    requirements for using this port.  This method does not require

>    modification to existing protocol stacks, though recommended updates

>    to make the port easier to use are included.

>

> File can be retrieved from:

>

> Please review and indicate your support or objection to proceed with the

> publication of this document by replying to this email keeping int-area@ietf.org<mailto:int-area@ietf.org> in

> copy. Objections should be explained and suggestions to resolve them are highly

> appreciated.

>

> Authors, and WG participants in general, are reminded of the Intellectual Property

> Rights (IPR) disclosure obligations described in BCP 79 [1].

> Appropriate IPR disclosures required for full conformance with the provisions of

> BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any.

> Sanctions available for application to violators of IETF IPR Policy can be found at

> [3].

>

> Thank you.

>

> [1] https://urldefense.com/v3/__https://datatracker.ietf.org/doc/bcp78/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wBMmNVyrw$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/bcp78/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wBMmNVyrw$>

> [2] https://urldefense.com/v3/__https://datatracker.ietf.org/doc/bcp79/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAcx8g8TQ$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/bcp79/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAcx8g8TQ$>

> [3] https://urldefense.com/v3/__https://datatracker.ietf.org/doc/rfc6701/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAu2iQWow$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc6701/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAu2iQWow$>

>

> The IETF datatracker status page for this Internet-Draft is:

> https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-intarea-multicast-application-port/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAIIhZxCw$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-ietf-intarea-multicast-application-port/__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAIIhZxCw$>

>

> There is also an HTMLized version available at:

> https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-ietf-intarea-multicast-application-port-03__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wDNPBIPDg$<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-ietf-intarea-multicast-application-port-03__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wDNPBIPDg$>

>

> A diff from the previous version is available at:

> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-intarea-multicast-application-port-__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAFQLDkZQ$<https://urldefense.com/v3/__https:/author-tools.ietf.org/iddiff?url2=draft-ietf-intarea-multicast-application-port-__;!!EJc4YC3iFmQ!RgVRKPn4wFOvXHzhNonMiEmjUeybwQrEmQc__RfeYEaqVlwMVWCKzviR9TQt1kCHSdUljuXQsYLsBwxfYSlKObjs6wAFQLDkZQ$>

> 03

>

> _______________________________________________

> Int-area mailing list -- int-area@ietf.org<mailto:int-area@ietf.org> To unsubscribe send an email to int-area-

> leave@ietf.org<mailto:leave@ietf.org>



_______________________________________________

Int-area mailing list -- int-area@ietf.org<mailto:int-area@ietf.org>

To unsubscribe send an email to int-area-leave@ietf.org<mailto:int-area-leave@ietf.org>

________________________________

CONFIDENTIALITY NOTICE: This email and any attachments are for the sole use of the intended recipient(s) and contain information that may be Garmin confidential and/or Garmin legally privileged. If you have received this email in error, please notify the sender by reply email and delete the message. Any disclosure, copying, distribution or use of this communication (including attachments) by someone other than the intended recipient is prohibited. Thank you.

________________________________

CONFIDENTIALITY NOTICE: This email and any attachments are for the sole use of the intended recipient(s) and contain information that may be Garmin confidential and/or Garmin legally privileged. If you have received this email in error, please notify the sender by reply email and delete the message. Any disclosure, copying, distribution or use of this communication (including attachments) by someone other than the intended recipient is prohibited. Thank you.

________________________________

CONFIDENTIALITY NOTICE: This email and any attachments are for the sole use of the intended recipient(s) and contain information that may be Garmin confidential and/or Garmin legally privileged. If you have received this email in error, please notify the sender by reply email and delete the message. Any disclosure, copying, distribution or use of this communication (including attachments) by someone other than the intended recipient is prohibited. Thank you.

________________________________

CONFIDENTIALITY NOTICE: This email and any attachments are for the sole use of the intended recipient(s) and contain information that may be Garmin confidential and/or Garmin legally privileged. If you have received this email in error, please notify the sender by reply email and delete the message. Any disclosure, copying, distribution or use of this communication (including attachments) by someone other than the intended recipient is prohibited. Thank you.